Application of intelligent information processing technologies to intrusion detection system

被引:0
|
作者
Wang, Xuren [1 ]
He, Famei [1 ]
Peng, Yan [1 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100037, Peoples R China
关键词
network security; intelligent information processing; intrusion detection system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In Intrusion Detection Systems, attack-specific signatures are used to detect known attacks in network traffic. Finding anomalous network activity is difficult and tedious. Many intelligent information processing methods, data miming technology and so on have been applied to generating attack signatures automatically, updating signatures easily and improving detection accuracy with ultra data set. An application is built in which we employ rough set theory, association rule discovery and naive Bayesian learning to automatically generate rules for classifying network connections. This paper describes the methodology and the applications employing this methodology. Empirical results illustrate that the intrusion detection model can detect intrusion accurately.
引用
收藏
页码:274 / 277
页数:4
相关论文
共 50 条
  • [1] Application of hospital information security based on Intelligent Intrusion Detection System
    Li, Xingshan
    Zhang, Yifan
    Xu, Min
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND MATERIALS (ICMCM 2016), 2016, 104 : 412 - 416
  • [2] Intelligent surveillance system with integration of heterogeneous information for intrusion detection
    Castro, J. L.
    Delgado, M.
    Medina, J.
    Ruiz-Lozano, M. D.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (09) : 11182 - 11192
  • [3] Intelligent Processing of Intrusion Detection Data
    Duan, Tao
    Tian, Youhui
    Zhang, Hanrui
    Liu, Yaozong
    Li, Qianmu
    Jiang, Jian
    Shi, Zongsheng
    [J]. IEEE ACCESS, 2020, 8 : 78330 - 78342
  • [4] An intelligent intrusion detection system
    Nevrus Kaja
    Adnan Shaout
    Di Ma
    [J]. Applied Intelligence, 2019, 49 : 3235 - 3247
  • [5] Intelligent intrusion detection system
    Lee, KC
    Mikhailov, L
    [J]. 2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 497 - 502
  • [6] An intelligent intrusion detection system
    Kaja, Nevrus
    Shaout, Adnan
    Ma, Di
    [J]. APPLIED INTELLIGENCE, 2019, 49 (09) : 3235 - 3247
  • [7] Application of Grid Technologies in Linux Host Intrusion Detection System
    Tao, Xiaoling
    Wang, Yong
    [J]. INTERNATIONAL JOINT CONFERENCE ON COMPUTATIONAL SCIENCES AND OPTIMIZATION, VOL 1, PROCEEDINGS, 2009, : 13 - 17
  • [8] Research and application of intelligent intrusion detection system with accuracy analysis methodology
    Hu, Xianwei
    Li, Tie
    Wu, Zongzhi
    Gao, Xuan
    Wang, Zhiqiang
    [J]. INFRARED PHYSICS & TECHNOLOGY, 2018, 88 : 245 - 253
  • [9] Hybrid Intelligent Intrusion Detection System
    Bashah, Norbik
    Shanmugam, Idris Bharanidharan
    Ahmed, Abdul Marian
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 291 - 294
  • [10] An application of information theory to intrusion detection
    Eiland, E. Earl
    Liebrock, Lorie M.
    [J]. FOURTH IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2006, : 119 - +