A model of evolving intrusion detection system based on data mining and immune principle

被引:0
|
作者
Zhao, JZ [1 ]
Xu, MZ [1 ]
Sun, SL [1 ]
You, L [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Sch Sci, Beijing 100083, Peoples R China
关键词
computer network; computer security; intrusion detection; data mining; artificial immune system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, an IDS framework based on Data mining technique and immune principle is presented. Here Data mining technique is used to discover frequently occurred patterns, which are equivalent to self proteins in immune system. Immune principle is explored to generate negative detectors, which does not math any self protein based on distance metric. These negative detectors are distributed into the network system to perform anomaly detection independently and concurrently. Our experiment shows that it has low false positive rate and high detection rate.
引用
收藏
页码:B199 / B202
页数:4
相关论文
共 50 条
  • [1] An Intrusion Detection System Model Based on Immune Principle and Performance Analysis
    CHEN Zhi-xian~1
    2.State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2005, (01) : 31 - 35
  • [2] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [3] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [4] An evolving intrusion detection system based on natural immune system
    Zhao, JH
    Huang, HK
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 129 - 132
  • [5] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [6] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [7] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [8] An intrusion detection model based on data mining over data
    Mao, Yi-Min
    Yang, Lu-Ming
    Chen, Zhi-Gang
    Liu, Li-Xin
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
  • [9] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    [J]. PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [10] A fuzzy data mining based intrusion detection model
    Jin, H
    Sun, JH
    Chen, H
    Han, ZF
    [J]. 10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 191 - 197