作者: Yun Yang , Jia Mi
DOI: 10.1109/ICCET.2010.5486267
关键词: Data mining 、 Anomaly-based intrusion detection system 、 Protocol analysis 、 Host-based intrusion detection system 、 Honeypot 、 Network security 、 Computer science 、 Feature extraction 、 Cluster analysis 、 Intrusion detection system
摘要: … the distributed honeypot architecture to ensure data control … classified statistics in terms of warning log. Besides, as system has a large quantity of statistical data, we compress the data …