Research on Data Stream Technology in Computer Network Security Monitoring
- DOI
- 10.2991/isrme-15.2015.407How to use a DOI?
- Keywords
- Data Stream Technology; Computer Network; Security Monitoring
- Abstract
With the rapid and bursting development in the subject of computer science and data mining technology, the combination of data analysis and network security is indeed needed. In response of the fact that traditional intrusion detection systems are not able to fulfill the requirements for specific network security, such as fast processing speed, stronger defense capability, and higher real-time performance. We propose a model based on network security on the integration of data stream mining and intrusion detection, after comparing data stream clustering methodology with other state-of-the-art clustering algorithms, we choose the former to act as the selected clustering algorithm. Finally, with the case analysis and simulation experiment, we illustrate the robustness and effectiveness of our proposed methodology.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Wei Xiong PY - 2015/04 DA - 2015/04 TI - Research on Data Stream Technology in Computer Network Security Monitoring BT - Proceedings of the 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering PB - Atlantis Press SP - 1978 EP - 1981 SN - 1951-6851 UR - https://doi.org/10.2991/isrme-15.2015.407 DO - 10.2991/isrme-15.2015.407 ID - Xiong2015/04 ER -