Data Mining in DHCP Security
نویسندگان
چکیده
منابع مشابه
Data Mining in DHCP Security
A dynamic IP address is an IP address that is dynamically assigned to your computer by your Internet service provider (ISP). Once your computer or router is refreshed, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. DHCP follows sequence in assigning an IP address to the host. If a particular host find its IP address it can easily know another host’s ip...
متن کاملData Mining in DHCP Security
A dynamic IP address is an IP address that is dynamically assigned to your computer by your Internet service provider (ISP). Once your computer or router is refreshed, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. DHCP follows sequence in assigning an IP address to the host. If a particular host find its IP address it can easily know another host’s ip...
متن کاملData Mining in Security Applications
In recent years, research in many security areas has gained a lot of interest among scientists in academia, industry, military and governmental organizations. Researchers have been investigating many advanced technologies to effectively solve acute security problems. Data mining has certainly been one of the most explored technologies successfully applied in many security applications ranging f...
متن کاملSecurity and Data Mining
Database mining can be defined as the process of mining for implicit, previously unknown, and potentially useful information from very large databases by efficient knowledge discovery techniques. Naturally such a process may open up new inference channels, detect new intrusion patterns, and raises new security problems. New security concern and research problems are addressed and identified. Fi...
متن کاملthe clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance
با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2016
ISSN: 0975-8887
DOI: 10.5120/ijca2016909566