Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems

被引:2
|
作者
Su, Ming-Yang
Yeh, Sheng-Cheng
Chang, Kai-Chi
Wei, Hua-Fu
机构
关键词
D O I
10.1109/WAINA.2008.69
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper, we propose a fast algorithm to generate fuzzy association rules by incremental mining approach, for which the transactions or data records are online instantly collected from live packets. That is, as one data record is collected online, the latest fuzzy rules can be obtained immediately. According to our simulation, in case of the number of features do not excess twenty, mining process can be completed from several milliseconds to seconds depending on the number of features.
引用
收藏
页码:50 / 55
页数:6
相关论文
共 50 条
  • [1] A real-time Network Intrusion Detection System based on incremental mining approach
    Su, Ming-Yang
    Chang, Kai-Chi
    Wei, Hua-Fu
    Lin, Chun-Yuen
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 179 - +
  • [2] A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
    Su, Ming-Yang
    Yu, Gwo-Jong
    Lin, Chun-Yuen
    [J]. COMPUTERS & SECURITY, 2009, 28 (05) : 301 - 309
  • [3] A hybrid approach for real-time network intrusion detection systems
    Lee, Sang Min
    Kim, Dong Seong
    Park, Jong Sou
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 712 - 715
  • [4] Real-Time Network Intrusion Prevention System Using Incremental Feature Generation
    Uhm, Yeongje
    Pak, Wooguil
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1631 - 1648
  • [5] A real-time intrusion detection system using data mining technique
    Leu, Fang-Yie
    Hu, Kai-Wei
    [J]. INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL II, 2007, : 148 - 153
  • [6] Applying data mining of fuzzy association rules to network intrusion detection
    El-Semary, Aly
    Edmonds, Janica
    Gonzalez-Pino, Jesus
    Papa, Mauricio
    [J]. 2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 100 - +
  • [7] A fuzzy kernel-based method for real-time network intrusion detection
    Petrovskiy, M
    [J]. INNOVATIVE INTERNET COMMUNITY SYSTEMS, 2003, 2877 : 189 - 200
  • [8] Real-time risk assessment with network sensors and intrusion detection systems
    Årnes, A
    Sallhammar, K
    Haslum, K
    Brekne, T
    Moe, MEG
    Knapskog, SJ
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 388 - 397
  • [9] Flexible and Robust Real-Time Intrusion Detection Systems to Network Dynamics
    Yu, Kicho
    Khanh Nguyen
    Park, Younghee
    [J]. IEEE ACCESS, 2022, 10 : 98959 - 98969
  • [10] Real-Time Intrusion Detection with Fuzzy Genetic Algorithm
    Jongsuebsuk, P.
    Wattanapongsakorn, N.
    Charnsripinyo, C.
    [J]. 2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2013,