Association rule mining in DoS attack detection and defense in the application of network

被引:0
|
作者
Zheng, Jigang [1 ]
Zhang, Jingmei [2 ]
机构
[1] Baoshan Coll, Dept Math, Baoshan 678000, Yunnan, Peoples R China
[2] Lib Baoshan Coll, Baoshan 678000, Yunnan, Peoples R China
关键词
Association rule; Intrusion detection; Data mining; Characteristic attribute; KDDCup99;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Association rule mining is widely used in network intrusion detection,an important feature of attribute extraction of KDDCup99 data set of denial of service attack records,for the association rules mining association rules between different attributes with the help of Weka,the intrusion detection and prevention of further study has reference significance.Mining association rules reflect the relationship between different attributes,the establishment of the intrusion detection system is effective and adaptive for the next step,has a very broad application prospects.
引用
收藏
页码:445 / 449
页数:5
相关论文
共 50 条
  • [1] DoS Attack Pattern Mining Based on Association Rule Approach for Web Server
    Chen, Hsing-Chung
    Kuo, Shyi-Shiun
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 527 - 536
  • [2] A DoS attack defense model adopting data mining
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
    Dianzi Keji Diaxue Xuebao, 2008, 4 (586-589):
  • [3] Association Rule Mining for Detection of Colluding SSDF Attack in Cognitive Radio Networks
    Bhattacharjee, Suchismita
    Keitangnao, Raiping
    Marchang, Ningrinla
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [4] Application of network cybernetics in network attack and Defense
    He, Ning
    Lu, Yu
    Wang, Lei
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1967 - 1971
  • [5] A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques
    Djanie, Kotey Seth
    Tutu, Tchao Eric
    Dzisi, Gadze James
    COMPUTERS, 2019, 8 (04)
  • [6] A framework for the application of association rule mining in large intrusion detection infrastructures
    Treinen, James J.
    Thurimella, Ramakrishna
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 1 - 18
  • [7] An Analysis on DOS Attack and Defense Technology
    Lin Jingna
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1102 - 1105
  • [9] A fault detection model for microgrid detection based on Bayesian network and association rule mining
    Guo, Qiyi, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):
  • [10] Detection DoS Attack on FPGA Using Fuzzy Association Rules
    Tuncer, Taner
    Tatar, Yetkin
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1271 - 1276