A data mining based intrusion detection model

被引:0
|
作者
Sun, JH [1 ]
Jin, H [1 ]
Chen, H [1 ]
Han, ZF [1 ]
Zou, DQ [1 ]
机构
[1] Huazhong Univ Sci & Technol, Internet & Cluster Comp Ctr, Wuhan 430074, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection Systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to block intrusion effectively and accurately. However, the performance of IDS is not satisfying. In this paper, we study the issue of building a data mining based intrusion detection model to raise the detection performance. The key ideas are to use data mining techniques to discover consistent and useful patterns for intrusion and use the set of patterns to recognize intrusion. By applying statistics inference theory to this model, the patterns mined from a set of test data are effective to detect the attacks in the same category, and therefore can detect most novel attacks that are variants of known attacks.
引用
收藏
页码:677 / 684
页数:8
相关论文
共 50 条
  • [21] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [22] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [23] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [24] A DDOS Intrusion Detection Method Based On Data Mining
    Tian Jun-feng
    Pang Tao
    Du Rui-zhong
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 42 - 46
  • [25] An efficient framework for intrusion detection based on data mining
    Li, Weidong
    Zhang, Kejun
    Li, Boqun
    Yang, Bingru
    2005 ICSC CONGRESS ON COMPUTATIONAL INTELLIGENCE METHODS AND APPLICATIONS (CIMA 2005), 2005, : 55 - 58
  • [26] Study on Multi-Grade Intrusion Detection Model Based on Data Mining Technology
    Ablat, Halqam
    2011 TENTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES), 2011, : 259 - 265
  • [27] Data mining based design for the detection engine of the intrusion detection system
    Lu, Xi-Xiang
    Yang, Bo
    Pei, Chang-Xing
    Su, Xiao-Long
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (04): : 574 - 580
  • [28] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [29] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306
  • [30] Data mining approaches for intrusion detection
    Lee, W
    Stolfo, SJ
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93