Integrating Intrusion Detection System and Data Mining

被引:4
作者
Yusufovna, Sattarova Feruza [1 ]
机构
[1] Tashkent Univ Informat Technol, Tashkent, Uzbekistan
来源
INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS | 2008年
关键词
Data mining; intrusion detection; feature selection;
D O I
10.1109/UMC.2008.59
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the application of data mining approaches for an intrusion detection system. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of the resource of a computer system. In this paper, an IDS model is presented as well as its limitation in determining security violations. Furthermore, this paper focuses on several data mining techniques that can aid in the process of intrusion detection.
引用
收藏
页码:256 / 259
页数:4
相关论文
共 8 条
[1]  
[Anonymous], DATA MANAGEMENT HDB
[2]  
[Anonymous], PRINCIPLES DATA MINI
[3]  
FRAWLEY W, KNOWLEDGE DISCOVERY, P213
[4]  
Heady R.E., 1990, The architecture of a network level intrusion detection system
[5]  
Lee W. L. W., 1999, P 1999 IEEE S SEC PR
[6]  
Mittal V, 2002, P 9 ACM C COMP COMM, P127
[7]  
MUKKAMALA R, DATABASE INFORM SYST
[8]  
ZHANG J, 2006, P IEEE INT C COMM IC