Data Mining Based Network Intrusion Detection System: A Survey

被引:11
|
作者
Helali, Rasha G. Mohammed [1 ]
机构
[1] Sudan Univ Sci & Technol, Coll Comp Sci & Informat Technol, Khartoum, Sudan
关键词
Clustering; Knowledge Discovery and Data Mining cup; Hidden Makov Models; Network Intrusion Detection System; Signature - based IDS;
D O I
10.1007/978-90-481-3662-9_86
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Significant security problem for networked systems is hostile trespass by users or software. Intruder is one of the most publicized threats to security. Network Intrusion Detection Systems (NIDS) have become a standard component in network security infrastructures. This paper presents the features of signature based NIDS in addition to the current state-of-the-art of Data Mining based NIDS approaches. Moreover, the paper provides general guidance for open research areas and future directions. The intention of this survey is to give the reader a broad overview of the work that has been done at the intersection between intrusion detection and data mining.
引用
收藏
页码:501 / 505
页数:5
相关论文
共 50 条
  • [1] Research on a Network Intrusion Detection System Based on Data Mining
    Fang, Zhongjin
    Zhou, Shu
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 204 - 209
  • [2] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
  • [3] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    [J]. Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [4] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    [J]. 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [5] Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey
    Subaira, A. S.
    Scholar, P. G.
    Anitha, P.
    [J]. 2014 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2014, : 274 - 280
  • [6] The Development of Computer Network Intrusion Detection System Based on Data Mining
    Shan, Chen
    [J]. MECHANICAL, MATERIALS AND MANUFACTURING ENGINEERING, PTS 1-3, 2011, 66-68 : 2248 - 2251
  • [7] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [8] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [9] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [10] The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining
    Fu, Desheng
    Zhou, Shu
    Guo, Ping
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 446 - 450