A model of evolving intrusion detection system based on data mining and immune principle

被引:0
|
作者
Zhao, JZ [1 ]
Xu, MZ [1 ]
Sun, SL [1 ]
You, L [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Sch Sci, Beijing 100083, Peoples R China
关键词
computer network; computer security; intrusion detection; data mining; artificial immune system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, an IDS framework based on Data mining technique and immune principle is presented. Here Data mining technique is used to discover frequently occurred patterns, which are equivalent to self proteins in immune system. Immune principle is explored to generate negative detectors, which does not math any self protein based on distance metric. These negative detectors are distributed into the network system to perform anomaly detection independently and concurrently. Our experiment shows that it has low false positive rate and high detection rate.
引用
收藏
页码:B199 / B202
页数:4
相关论文
共 50 条
  • [41] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [42] Intrusion detection system based on new association rule mining model
    Li, TR
    Pan, WM
    2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 512 - 515
  • [43] Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)
    Duque, Solane
    bin Omar, Mohd Nizam
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 46 - 51
  • [44] A Research into an Intrusion Detection System Based on Immune Principle and Multi-Agent in WSN
    Liu ZhiYue
    Wang Jian
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5157 - +
  • [45] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [46] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [47] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [48] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [49] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [50] Data mining descriptive model for intrusion detection systems
    Hentea, M
    Innovations Through Information Technology, Vols 1 and 2, 2004, : 1118 - 1119