Research and Application of Mobile Agent Invasion Detection Model Based on Data Mining

被引:0
|
作者
Liu, Jian-jun [1 ]
机构
[1] Dezhou Univ, Dept Comp, Dezhou 253023, Shandong, Peoples R China
关键词
invasion detection; exceptional detection; misuse detection; data mining; mobile agent; Cluster analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the information era, the network has become not only a primary means of data exchange and business transaction but also attackers' major target. Therefore, an invasion detection technology which can discover and report non-authorized access or anomalies of system came into being. Traditional invasion detection system is inefficient and unsatisfactory in detecting ability, this article proposed a kind of mobile agent invasion detection model based on data mining algorithm, applied separately relating rule algorithm to exceptional detection and misuse detection, carried on analysis to new unknown behavior that existed in border zone of two kinds of detection pattern with cluster algorithm. However mobile agent can shift automatically to target system and collect only information relative to invasion, the system log is no longer transmitted to the server. The communication load of system is reduced enormously, and working efficiency is increased, The validity of this model has been proven by simulation experiment.
引用
收藏
页码:127 / 131
页数:5
相关论文
共 50 条
  • [21] AgentUDM:: A mobile agent based support infrastructure for ubiquitous data mining
    Soe, TA
    Krishnaswamy, S
    Loke, SW
    Indrawan, M
    Sethi, D
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 256 - 259
  • [22] Research on Mobile-Agent Based Data Access Model in Pervasive Computing Environment
    Li Fan
    Jiang WeiJian
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1523 - +
  • [23] Research on the Method and Application of MapReduce in Mobile Track Big Data Mining
    Liang, Shaoyu
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2021, 14 (01) : 20 - 28
  • [24] Research on Mobile-agent Based for ASP Model
    Zhang, Wei
    Pan, Xiaohong
    IITSI 2009: SECOND INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS, 2009, : 21 - 24
  • [25] Research of CAT Model based on mobile agent group
    Jiang Derong
    Hu Jian-feng
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 393 - 396
  • [26] Research of Dynamic Negotiation Model Based on Mobile Agent
    Guo, Fang
    Xiao, Jie
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING, 2014, 113 : 697 - 700
  • [27] A model for mobile agent based intrusion detection system
    Hu, JL
    Wang, JZ
    Liu, AZ
    Yang, SM
    ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2, 2005, : 569 - 574
  • [28] RESEARCH ON DISTRIBUTED DATA MINING BASED ON MULTI-AGENT
    Wang, Ruijie
    Du, Junping
    Yin, Yixin
    Tu, Xuyan
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 194 - +
  • [29] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [30] A New Model to Enhance Efficiency in Distributed Data Mining Using Mobile Agent
    Bardab, Saeed Ngmaldin
    Ahmed, Tarig Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (03): : 275 - 286