Research and Application of Mobile Agent Invasion Detection Model Based on Data Mining

被引:0
|
作者
Liu, Jian-jun [1 ]
机构
[1] Dezhou Univ, Dept Comp, Dezhou 253023, Shandong, Peoples R China
关键词
invasion detection; exceptional detection; misuse detection; data mining; mobile agent; Cluster analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the information era, the network has become not only a primary means of data exchange and business transaction but also attackers' major target. Therefore, an invasion detection technology which can discover and report non-authorized access or anomalies of system came into being. Traditional invasion detection system is inefficient and unsatisfactory in detecting ability, this article proposed a kind of mobile agent invasion detection model based on data mining algorithm, applied separately relating rule algorithm to exceptional detection and misuse detection, carried on analysis to new unknown behavior that existed in border zone of two kinds of detection pattern with cluster algorithm. However mobile agent can shift automatically to target system and collect only information relative to invasion, the system log is no longer transmitted to the server. The communication load of system is reduced enormously, and working efficiency is increased, The validity of this model has been proven by simulation experiment.
引用
收藏
页码:127 / 131
页数:5
相关论文
共 50 条
  • [1] The Research on Distributed Data Stream Mining based on Mobile Agent
    Yue Fuqiang
    PEEA 2011, 2011, 23
  • [2] Mobile agent based distributed data mining
    Kulkarni, U. P.
    Desai, P. D.
    Ahmed, Tanveer
    Vadavi, J. V.
    Yardi, A. R.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL II, PROCEEDINGS, 2007, : 18 - +
  • [3] A new hierarchical optimization model based on mobile agent for distributed data mining
    Li, Cheng-An
    Wu, Tie-Jun
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (02): : 281 - 284
  • [4] Research on distribute data mining model based on multi-agent
    Jiang, WJ
    Qiu, YN
    Xu, YH
    Progress in Intelligence Computation & Applications, 2005, : 369 - 375
  • [5] Research on Mobile User Behavior Mining Model Based on Big Data
    Hong Ruxia
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 461 - 464
  • [6] Mobile Agent technology and Its Application in Distributed Data Mining
    Ma Yubao
    Ding Renyuan
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 151 - 155
  • [7] Research of Distributed Intrusion Detection System Model Based on Mobile Agent
    Liu Jianxiao
    Li Lijuan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 53 - 57
  • [8] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [9] Mobile Agent Model with Efficient Communication for Distributed Data Mining
    Kavitha, S.
    Kumar, K. Senthil
    Anandam, K. V. Arul
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 421 - 429
  • [10] The Model and Empirical Research of Application Scoring Based on Data Mining Methods
    Lai Hui
    Shuai Li
    Zhou Zongfang
    FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 911 - 918