Integrating Intrusion Detection System and Data Mining

被引:4
|
作者
Yusufovna, Sattarova Feruza [1 ]
机构
[1] Tashkent Univ Informat Technol, Tashkent, Uzbekistan
关键词
Data mining; intrusion detection; feature selection;
D O I
10.1109/UMC.2008.59
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the application of data mining approaches for an intrusion detection system. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of the resource of a computer system. In this paper, an IDS model is presented as well as its limitation in determining security violations. Furthermore, this paper focuses on several data mining techniques that can aid in the process of intrusion detection.
引用
收藏
页码:256 / 259
页数:4
相关论文
共 50 条
  • [1] Integrating data mining techniques with intrusion detection methods
    Mukkamala, R
    Gagnon, J
    Jajodia, S
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46
  • [2] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [3] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [4] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [5] Network Intrusion Detection System Using Data Mining
    Lima de Campos, Lidio Mauro
    Limao de Oliveira, Roberto Celio
    Roisenberg, Mauro
    ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
  • [6] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [7] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [8] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [9] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [10] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203