Framework of intrusion detection based on distributed data mining approach

被引:0
|
作者
Lu, Yong
Cao, Yang
Ling, Jun
Li, Li
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
下载
收藏
相关论文
共 50 条
  • [31] An intrusion detection model based on data mining over data
    Mao, Yi-Min
    Yang, Lu-Ming
    Chen, Zhi-Gang
    Liu, Li-Xin
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
  • [32] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [33] Towards a Multiagent-Based Distributed Intrusion Detection System Using Data Mining Approaches
    Brahmi, Imen
    Ben Yahia, Sadok
    Aouadi, Hamed
    Poncelet, Pascal
    AGENTS AND DATA MINING INTERACTION, 2012, 7103 : 173 - +
  • [34] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [35] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [36] A fuzzy data mining based intrusion detection model
    Jin, H
    Sun, JH
    Chen, H
    Han, ZF
    10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 191 - 197
  • [37] A rough neuro data mining approach for network intrusion detection
    Bhaskar, T
    Kamath, BN
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 534 - 534
  • [38] A DDOS Intrusion Detection Method Based On Data Mining
    Tian Jun-feng
    Pang Tao
    Du Rui-zhong
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 42 - 46
  • [39] An Efficient Approach for Intrusion Detection Using Data Mining Methods
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravindra
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1615 - 1618
  • [40] A distributed autonomous intrusion detection framework
    Cai, Yu
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 126 - 130