Research and Application of Mobile Agent Invasion Detection Model Based on Data Mining

被引:0
|
作者
Liu, Jian-jun [1 ]
机构
[1] Dezhou Univ, Dept Comp, Dezhou 253023, Shandong, Peoples R China
关键词
invasion detection; exceptional detection; misuse detection; data mining; mobile agent; Cluster analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the information era, the network has become not only a primary means of data exchange and business transaction but also attackers' major target. Therefore, an invasion detection technology which can discover and report non-authorized access or anomalies of system came into being. Traditional invasion detection system is inefficient and unsatisfactory in detecting ability, this article proposed a kind of mobile agent invasion detection model based on data mining algorithm, applied separately relating rule algorithm to exceptional detection and misuse detection, carried on analysis to new unknown behavior that existed in border zone of two kinds of detection pattern with cluster algorithm. However mobile agent can shift automatically to target system and collect only information relative to invasion, the system log is no longer transmitted to the server. The communication load of system is reduced enormously, and working efficiency is increased, The validity of this model has been proven by simulation experiment.
引用
收藏
页码:127 / 131
页数:5
相关论文
共 50 条
  • [41] A Framework for Data Mining Based Multi-Agent: An Application to Spatial Data
    Zghal, H. Baazaoui
    Faiz, S.
    Ben Ghezala, H.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 5, 2005, 5 : 22 - 26
  • [42] Research on the Web Mining Framework Based on Mobile Agent and E-Commerce
    Huang, Weijian
    Zhou, Xuqian
    Wang, Nianpeng
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 299 - 302
  • [43] RESEARCH OF OUTLIER MINING FRAMEWORK FOR DATA STREAMS BASED ON MULTI-AGENT SYSTEM AND ITS APPLICATION
    Li Zhongwei
    2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 271 - 274
  • [44] A Model for Parallel Data Mining Based on Multi-Agent
    Meng, Xianglei
    Dang, Deyu
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5281 - 5284
  • [45] Application and research of data mining
    Anhui Vocational and Technical College, Hefei 230051, China
    Hua Dong Li Gong Da Xue/J East China Univ Sci Technol, 2008, 2 (290-295):
  • [46] An intrusion detection model based on data mining over data
    Mao, Yi-Min
    Yang, Lu-Ming
    Chen, Zhi-Gang
    Liu, Li-Xin
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
  • [47] Research on Mobile User Dynamic Trust Model Based on Mobile Agent System
    Jiang, Weijin
    Xu, Yuhui
    HUMAN CENTERED COMPUTING, HCC 2017, 2018, 10745 : 538 - 549
  • [48] Research on the Application of Data Mining to Customer Relationship Management in the Mobile Communication Industry
    Gu Guifang
    He Youshi
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 597 - 599
  • [49] A mobile-agent-based application model design of pervasive mobile devices
    Yang, Xiang
    Zhang, Yuanyi
    Niu, Qinzhou
    Tao, Xiaomei
    Wu, Luo
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 1 - +
  • [50] Research On Grid Transaction Processing Model based on Mobile Agent
    Li Taoshen
    Liang Yu
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 2, 2011, : 326 - 329