dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Mokhonoana, PM
|
|
dc.contributor.author |
Vorster, J
|
|
dc.date.accessioned |
2009-03-05T09:27:47Z |
|
dc.date.available |
2009-03-05T09:27:47Z |
|
dc.date.issued |
2006-07 |
|
dc.identifier.citation |
Veerasamy, N, Mokhonoana, PM and Vorster, J. 2006. Applying data-mining techniques in honeypot analysis. Information Security South Africa conference (ISSA2006), 1-5 July, pp 9. |
en |
dc.identifier.uri |
http://hdl.handle.net/10204/3127
|
|
dc.description |
Information Security South Africa Conference (ISSA2006),1-5 July 2006 |
en |
dc.description.abstract |
This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it will better identify and classify attacks than the rule based intrusion IDS’s |
en |
dc.language.iso |
en |
en |
dc.subject |
Data mining |
en |
dc.subject |
Honeypots |
en |
dc.subject |
Intrusion-detection system (IDS) |
en |
dc.title |
Applying data-mining techniques in honeypot analysis |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Veerasamy, N., Mokhonoana, P., & Vorster, J. (2006). Applying data-mining techniques in honeypot analysis. http://hdl.handle.net/10204/3127 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, PM Mokhonoana, and J Vorster. "Applying data-mining techniques in honeypot analysis." (2006): http://hdl.handle.net/10204/3127 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Mokhonoana P, Vorster J, Applying data-mining techniques in honeypot analysis; 2006. http://hdl.handle.net/10204/3127 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AU - Mokhonoana, PM
AU - Vorster, J
AB - This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it will better identify and classify attacks than the rule based intrusion IDS’s
DA - 2006-07
DB - ResearchSpace
DP - CSIR
KW - Data mining
KW - Honeypots
KW - Intrusion-detection system (IDS)
LK - https://researchspace.csir.co.za
PY - 2006
T1 - Applying data-mining techniques in honeypot analysis
TI - Applying data-mining techniques in honeypot analysis
UR - http://hdl.handle.net/10204/3127
ER -
|
en_ZA |