Association Rules Applied to Intrusion Detection

被引:0
|
作者
Mao Ping ping
机构
关键词
intrusion detection; association rules; fuzzy logic;
D O I
暂无
中图分类号
TN915.08 [网络安全];
学科分类号
0839 ;
摘要
We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user’s behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance.
引用
收藏
页码:426 / 430
页数:5
相关论文
共 50 条
  • [1] Mining Association Rules for Intrusion Detection
    Wang, Hui
    Zhang, Guoping
    Chen, Huiguo
    Jiang, Xueshu
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 644 - +
  • [2] Application of fuzzy association rules in intrusion detection
    Wu, KaiXing
    Hao, Juan
    Wang, Chunhua
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 211 - 214
  • [3] The Application of Association Rules to SVM Intrusion Detection
    Shi Lei
    Qu Zhiyi
    Lv Guiqing
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 45 - 49
  • [4] Intrusion detection using fuzzy association rules
    Tajbakhsh, Arman
    Rahmati, Mohammad
    Mirzaei, Abdolreza
    APPLIED SOFT COMPUTING, 2009, 9 (02) : 462 - 469
  • [5] Research of Intrusion Detection Technology Based on Association Rules
    Zhangbo
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
  • [6] Intrusion Detection Based on Immune Principles and Fuzzy Association Rules
    Zhang Lei
    Meng Lingrui
    Hou Chunjie
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 31 - 35
  • [7] Hybrid Approach for Intrusion Detection using Fuzzy Association Rules
    Douzi, Samira
    Benchaji, Ibtissam
    El Ouahidi, Bouabid
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [8] Application of Association Rules Based on CF Gene in Intrusion Detection
    Fu Rong
    Liu Liyan
    Zhang Yingqian
    He Yi
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 2603 - 2606
  • [9] Association rules applied to credit card fraud detection
    Sanchez, D.
    Vila, M. A.
    Cerda, L.
    Serrano, J. M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) : 3630 - 3640
  • [10] An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
    Lin, Shih-Wei
    Ying, Kuo-Ching
    Lee, Chou-Yuan
    Lee, Zne-Jung
    APPLIED SOFT COMPUTING, 2012, 12 (10) : 3285 - 3290