Design of Intrusion Detection Model Based on Data Mining Technology

被引:1
作者
Li Yin-huan [1 ]
机构
[1] Jiangmen Polytech, Jiangmen, Guangdong, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE) | 2012年
关键词
FP-Growth algorithm; data mining; intrusion detection;
D O I
10.1109/ICICEE.2012.156
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper focuses on an improved FP-Growth algorithm. Preprocessing of data mining can increase efficiency on searching the common prefix of node and reduce the time complexity of building FP-tree. Based on the improved FP-Growth algorithm and other data mining techniques, an intrusion detection model is carried out. The experimental results demonstrate effectiveness of the improved algorithm and feasibility of intrusion detection model.
引用
收藏
页码:571 / 574
页数:4
相关论文
共 18 条
[1]  
Agrawal R., 1996, ADV KNOWLEDGE DISCOV, V12, P307, DOI DOI 10.1007/978-3-319-31750-2.
[2]  
BAI Hao, 2010, BEIJING U TECHNOLOGY, V30
[3]  
Caswell Brian, 2004, SNORT2 0 INTRUSION D, P21
[4]  
CHEN Min, 2009, COMPUTER ENG, V35
[5]  
Eskin E., 2002, GEOMETRIC FRAMEWORK
[6]  
[范明 Fan Ming], 2003, [计算机研究与发展, Journal of Computer Research and Development], V40, P1216
[7]  
Guan Y, 2004, P CAN C EL COMP ELLG, P4
[8]  
Guan Yu, 2003, CAN C EL COMP ENG MO
[9]  
Han JW, 2000, SIGMOD RECORD, V29, P1
[10]  
Huang Shuiyuan, 2006, MICROCOMPUTER INFORM, V22, P35