عنوان فارسی مقاله: | تشخیص نفوذ شبکه مبتنی بر فراخوان های سیستمی و داده کاوی |
عنوان انگلیسی مقاله: | Network intrusion detection based on system calls and data mining |
چکیده
1.مقدمه
2- تحلیل فرامین سیستمی و فرآیندهای ایمنی
3- آموزش
1-3- جمعآوری داده آموزشی
2-3-بخشبندی داده آموزشی در توالیهای همپوشی
3-3- محاسبه حمایتها و اطمینانهای مربوط به توالیهای فرامین سیستم
4-3- ایجاد مرجع توالیهای فرامین سیستمی
4.تشخیص
1-4- اکتساب داده قابل مشاهده
2-4- بخشبندی اثر در همپوشانی توالیهای فرامین سیستمی
3-4- تطابق توالی و تحلیل هنجاری
4-4- روانسازی جریان سنجش هنجاری و طبقهبندی رفتار فرآیند
5- تحلیل تجربی
6- نتیجهگیری
کلمات کلیدی :
[PDF]Network intrusion detection based on system calls and data mining iranarze.ir/wp-content/uploads/2016/10/5573-English.pdf program behavior, which is applicable to host-based intrusion detection systems monitoring system call activities. The method employs data mining techniques. Anomaly Intrusion Detection Based Upon Data Mining ... - IEEE Xplore ieeexplore.ieee.org/iel5/6362338/6377652/06377776.pdf by Y Yu - 2012 - Cited by 8 - Related articles input event (system call sequences generated from privileged processes) as ... low false alarm rate. Keywords-Anomaly Intrusion Detection; Data Mining; Naïve. Anomaly intrusion detection based upon data mining techniques and ... ieeexplore.ieee.org/document/6377776/ by Y Yu - 2012 - Cited by 8 - Related articles Anomaly intrusion detection based upon data mining techniques and fuzzy logic ... an input event (system call sequences generated from privileged processes) ... Intrusion detection based on system calls and homogeneous Markov ... https://www.researchgate.net/.../257444995_Intrusion_detection_based_on_system_calls... Detection and Classification of Non-self Based on System Call Related to Security ... Network intrusion detection based on system calls and data mining. Mal-Netminer: Malware Classification Approach Based on Social ... https://www.hindawi.com/journals/mpe/2015/769624/ by J Jang - 2015 - Cited by 2 - Related articles Aug 3, 2015 - To overcome drawbacks of previous system call-based techniques, we .... detection approach based on a system-wide quantitative data flow model. ... graph with system calls, mines significant behaviors from samples, and ...