ResearchSpace

Applying data-mining techniques in honeypot analysis

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.contributor.author Mokhonoana, PM
dc.contributor.author Vorster, J
dc.date.accessioned 2009-03-05T09:27:47Z
dc.date.available 2009-03-05T09:27:47Z
dc.date.issued 2006-07
dc.identifier.citation Veerasamy, N, Mokhonoana, PM and Vorster, J. 2006. Applying data-mining techniques in honeypot analysis. Information Security South Africa conference (ISSA2006), 1-5 July, pp 9. en
dc.identifier.uri http://hdl.handle.net/10204/3127
dc.description Information Security South Africa Conference (ISSA2006),1-5 July 2006 en
dc.description.abstract This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it will better identify and classify attacks than the rule based intrusion IDS’s en
dc.language.iso en en
dc.subject Data mining en
dc.subject Honeypots en
dc.subject Intrusion-detection system (IDS) en
dc.title Applying data-mining techniques in honeypot analysis en
dc.type Conference Presentation en
dc.identifier.apacitation Veerasamy, N., Mokhonoana, P., & Vorster, J. (2006). Applying data-mining techniques in honeypot analysis. http://hdl.handle.net/10204/3127 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha, PM Mokhonoana, and J Vorster. "Applying data-mining techniques in honeypot analysis." (2006): http://hdl.handle.net/10204/3127 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Mokhonoana P, Vorster J, Applying data-mining techniques in honeypot analysis; 2006. http://hdl.handle.net/10204/3127 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AU - Mokhonoana, PM AU - Vorster, J AB - This paper proposes the use of a data mining techniques to analyse the data recorded by the honeypot. This data can also be used to train Intrusion Detection Systems (IDS) in identifying attacks. Since the training is based on real data it will better identify and classify attacks than the rule based intrusion IDS’s DA - 2006-07 DB - ResearchSpace DP - CSIR KW - Data mining KW - Honeypots KW - Intrusion-detection system (IDS) LK - https://researchspace.csir.co.za PY - 2006 T1 - Applying data-mining techniques in honeypot analysis TI - Applying data-mining techniques in honeypot analysis UR - http://hdl.handle.net/10204/3127 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record