Research and Design on Intrusion Detection System Based on Data Mining

被引:0
|
作者
Song, Guoqin [1 ]
Guo, Yuanhui [1 ]
Qiu, Qianxi [2 ]
机构
[1] China West Normal Univ, Dept Expt Ctr, Nanchong 637000, Peoples R China
[2] China West Normal Univ, Dept Arch, Nanchong 637000, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper constructs a multilayer and dimensionality network security data set, and a hierarchical assessment process which is made up of atomic situation, host situation and network situation is established. Then the theory of self-information entropy is adopted to compute the occurring probability of atomic situation, using the method of weighted summation to analyze the situation of every layer. At last, the proposed assessment model and process are tested by the real network environment data.
引用
收藏
页码:188 / 194
页数:7
相关论文
共 50 条
  • [1] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [2] Research on a Network Intrusion Detection System Based on Data Mining
    Fang, Zhongjin
    Zhou, Shu
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 204 - 209
  • [3] Data mining based design for the detection engine of the intrusion detection system
    Lu, Xi-Xiang
    Yang, Bo
    Pei, Chang-Xing
    Su, Xiao-Long
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (04): : 574 - 580
  • [4] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [5] Design of data mining-based intrusion detection system
    Su, MD
    Liu, DQ
    Li, YF
    [J]. ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, : 93 - 95
  • [6] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    [J]. PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447
  • [7] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [8] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [9] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    [J]. 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [10] The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining
    Fu, Desheng
    Zhou, Shu
    Guo, Ping
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 446 - 450