Distributed Intrusion Detection Based on Outlier Mining

被引:0
|
作者
Da, Wei [1 ]
Ting, Han Shao [1 ]
机构
[1] Beijing Univ Chem Technol, Beijing 100029, Peoples R China
关键词
Intrusion Detection System; outlier mining;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet and network technologies, intrusion detection system (IDS) is expected to be more intelligent. Generally, IDS in current use can rarely meet actual requirements in performance, accuracy and distributed characteristics. In this paper, we present a distributed network intrusion detection system, in which an improved outlier mining method on clustering is introduced. Experimental results prove that both traditional attacks like SYN flooding, and distributed attacks such as DDoS, can be detected effectively with visible accuracy rate and reliability.
引用
收藏
页码:343 / 348
页数:6
相关论文
共 50 条
  • [31] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    [J]. International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [32] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    [J]. 2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [33] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [34] Text Mining Based Approach for Intrusion Detection
    Mangathayaru, Nimmala
    Kumar, Gunupudi Rajesh
    Narsimha, Gugulothu
    [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [35] Towards a Multiagent-Based Distributed Intrusion Detection System Using Data Mining Approaches
    Brahmi, Imen
    Ben Yahia, Sadok
    Aouadi, Hamed
    Poncelet, Pascal
    [J]. AGENTS AND DATA MINING INTERACTION, 2012, 7103 : 173 - +
  • [36] Robust Network Intrusion Detection Systems for Outlier Detection
    Desai, Rohan
    Venkatesh, T. G.
    [J]. 2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
  • [37] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION
    Nagamani, Ch.
    Chittineni, Suneetha
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473
  • [38] Distributed intrusion detection system based on ARTIS
    Qiao, PL
    Su, J
    Sun, CW
    [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 356 - 363
  • [39] A Distributed Intrusion Detection System Based on Agents
    Liu, Jianxiao
    Li, Lijuan
    [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 531 - 535
  • [40] Outlier Application Level based Intrusion detection and Prevention in Wireless Network
    Benisha, R. B.
    Ratna, S. Raja
    Prabhu, Arokia Jesu L.
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 418 - +