| Potential threats mining methods based on correlation analysis of multi-type logs |
| Qin, Tao; Gao, Yuli; Wei, Lingyan; Liu, Zhaoli; Wang, Chenxu
|
会议名称 | IET NETWORKS
|
会议日期 | 2018
|
会议地点 | 299-305
|
关键词 | computer
network
security
data
mining
regression
analysis
feature
extraction
operating
systems
(computers)
computational
complexity
correlation
analysis
potential
attacks
heterogeneous
features
feature
normalisation
anomaly
detection
platform
massive
logs
multitype
logs
log
analysis
log
events
operating
systems
potential
threats
mining
methods
network
level
feature
extraction
campus
network
Xi'an
Jiaotong
University
computational
complexity
Flume
HDFS
Spark
|
会议录 | Vol.7 No.5
|
URL标识 | 查看原文
|
内容类型 | 会议论文
|
URI标识 | http://www.corc.org.cn/handle/1471x/4753915
|
专题 | 湖南大学
|
作者单位 | 1.Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian, Shaanxi, Peoples R China 2.Xi An Jiao Tong Univ, Sch Software, Xian 710049, Shaanxi, Peoples R China
|
推荐引用方式 GB/T 7714 |
Qin, Tao,Gao, Yuli,Wei, Lingyan,et al. Potential threats mining methods based on correlation analysis of multi-type logs[C]. 见:IET NETWORKS. 299-305. 2018.
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论