Algorithm of Intrusion Detection Based on Data Mining and Its Implementation

被引:0
|
作者
孙海彬
徐良贤
陈彦华
机构
[1] China Dr
[2] Department of Computer Science and Engineering
[3] Henan 450002
[4] Institute of Communication
[5] PLA Information & Engineering University
[6] Shanghai 200030
[7] Shanghai Jiaotong University
[8] Zhengzhou
关键词
Intrusion detection; data mining; association rules; FP-Tree;
D O I
10.19884/j.1672-5220.2004.05.021
中图分类号
TN911 [通信理论];
学科分类号
081002 ;
摘要
Intrusion detection is regarded as classification in data mining field. However instead of directly mining the classification rules, class association rules, which are then used to construct a classifier, are mined from audit logs. Some attributes in audit logs are important for detecting intrusion but their values are distributed skewedly. A relative support concept is proposed to deal with such situation. To mine class association rules effectively, an algorithms based on FP-tree is exploited. Experiment result proves that this method has better performance.
引用
收藏
页码:88 / 92
页数:5
相关论文
共 50 条
  • [1] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [2] Power information network intrusion detection based on data mining algorithm
    Xiaojun Zuo
    Ze Chen
    Limian Dong
    Jie Chang
    Botao Hou
    The Journal of Supercomputing, 2020, 76 : 5521 - 5539
  • [3] An intrusion detection algorithm based on data streams mining and cognitive computing
    Li, Jianxin
    Cao, Wenliang
    Huang, Jinyu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 15 (Suppl 1) : 153 - 153
  • [4] Power information network intrusion detection based on data mining algorithm
    Zuo, Xiaojun
    Chen, Ze
    Dong, Limian
    Chang, Jie
    Hou, Botao
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5521 - 5539
  • [5] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [6] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [7] The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining
    Fu, Desheng
    Zhou, Shu
    Guo, Ping
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 446 - 450
  • [8] An improved algorithm for fuzzy data mining for intrusion detection
    Florez, G
    Bridges, SM
    Vaughn, RB
    2002 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY PROCEEDINGS, 2002, : 457 - 462
  • [9] A Design and Implementation of Intrusion Detection System by using Data Mining
    Sharma, Brijesh
    Gupta, Huma
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 700 - 704
  • [10] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38