Design of Intrusion Detection Model Based on Data Mining Technology

被引:1
|
作者
Li Yin-huan [1 ]
机构
[1] Jiangmen Polytech, Jiangmen, Guangdong, Peoples R China
关键词
FP-Growth algorithm; data mining; intrusion detection;
D O I
10.1109/ICICEE.2012.156
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper focuses on an improved FP-Growth algorithm. Preprocessing of data mining can increase efficiency on searching the common prefix of node and reduce the time complexity of building FP-tree. Based on the improved FP-Growth algorithm and other data mining techniques, an intrusion detection model is carried out. The experimental results demonstrate effectiveness of the improved algorithm and feasibility of intrusion detection model.
引用
收藏
页码:571 / 574
页数:4
相关论文
共 50 条
  • [41] An efficient framework for intrusion detection based on data mining
    Li, Weidong
    Zhang, Kejun
    Li, Boqun
    Yang, Bingru
    2005 ICSC CONGRESS ON COMPUTATIONAL INTELLIGENCE METHODS AND APPLICATIONS (CIMA 2005), 2005, : 55 - 58
  • [42] The Model Design of Educational Administration Safety-Based on Intrusion Detection Technology
    Wang Wei
    Liu XiTao
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 2, 2009, : 281 - 284
  • [43] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306
  • [44] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [45] Data mining approaches for intrusion detection
    Lee, W
    Stolfo, SJ
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93
  • [46] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [47] The WSN intrusion detection method based on deep data mining
    Zhang, Yiwei
    Journal of Cyber Security Technology, 2023, 7 (03) : 115 - 133
  • [48] Adaptive intrusion detection with data mining
    Hossain, M
    Bridges, SM
    Vaughn, RB
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3097 - 3103
  • [49] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [50] Framework of intrusion detection based on distributed data mining approach
    Lu, Yong
    Cao, Yang
    Ling, Jun
    Li, Li
    Wuhan Daxue Xuebao (Lixue Ban)/Journal of Wuhan University (Natural Science Edition), 2002, 48 (01):