5E: a framework to yield high performance in real-time data mining over the Internet

Author(s):  
A.K.Y. Wong ◽  
R.S.L. Wu
Author(s):  
Haqi Khalid ◽  
Shaiful Jahari Hashim ◽  
Sharifah Mumtazah Syed Ahamed ◽  
Fazirulhisyam Hashim ◽  
Muhammad Akmal Chaudhary

2014 ◽  
Vol 599-601 ◽  
pp. 1487-1490 ◽  
Author(s):  
Li Kun Zheng ◽  
Kun Feng ◽  
Xiao Qing Xiao ◽  
Wei Qiao Song

This paper mainly discusses the application of the mass real-time data mining technology in equipment safety state evaluation in the power plant and the realization of the equipment comprehensive quantitative assessment and early warning of potential failure by mining analysis and modeling massive amounts of real-time data the power equipment. In addition to the foundational technology introduced in this paper, the technology is also verified by the application case in the power supply side remote diagnosis center of Guangdong electric institute.


Repositor ◽  
2020 ◽  
Vol 2 (5) ◽  
pp. 541
Author(s):  
Denni Septian Hermawan ◽  
Syaifuddin Syaifuddin ◽  
Diah Risqiwati

AbstrakJaringan internet yang saat ini di gunakan untuk penyimpanan data atau halaman informasi pada website menjadi rentan terhadap serangan, untuk meninkatkan keamanan website dan jaringannya, di butuhkan honeypot yang mampu menangkap serangan yang di lakukan pada jaringan lokal dan internet. Untuk memudahkan administrator mengatasi serangan digunakanlah pengelompokan serangan dengan metode K-Means untuk mengambil ip penyerang. Pembagian kelompok pada titik cluster akan menghasilkan output ip penyerang.serangan di ambil sercara realtime dari log yang di miliki honeypot dengan memanfaatkan MHN.Abstract The number of internet networks used for data storage or information pages on the website is vulnerable to attacks, to secure the security of their websites and networks, requiring honeypots that are capable of capturing attacks on local networks and the internet. To make it easier for administrators to tackle attacks in the use of attacking groupings with the K-Means method to retrieve the attacker ip. Group divisions at the cluster point will generate the ip output of the attacker. The strike is taken as realtime from the logs that have honeypot by utilizing the MHN.


Sign in / Sign up

Export Citation Format

Share Document