The Application of Data Mining in the Honeypot System

Article Preview

Abstract:

Honeypot is a new type of active defense security technologies. This paper attempts to use of data mining methods to be mining and analysis of information collected on the honeypot system. Build a Windows system based on virtual machine technology research honeynet. Data collection be standardized and sequential pattern mining. Finding out the correlation between different data records and frequent with time-based sequence of audit data, which found that,select the law of value of the attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

189-192

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] The Honeynet Project. http: /www. honeynet. org, (2007).

Google Scholar

[2] Honey Project. Know your enemy [EB/OL]. http: /www. honey. org/papers/honeynet/index. html.

Google Scholar

[3] Changyan Peng, Chaojing Tang and Senqiang Zhang: Electronic Engineer. Vol. 30(2004), p.59. (In Chinese).

Google Scholar

[4] Libo Ma, Haixin Duan and Xing Li: Journal of Dalian University of Technology. Vol. 45 Suppl . (2005), p.150 (In Chinese).

Google Scholar

[5] Zhi Zhang, Yan Geng and Guanzhong Dai: Journal of Chinese Computer Systems. Vol. 26(2005), p.920. (In Chinese).

Google Scholar