Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach

被引:0
作者
Jiang Shan [1 ]
Chen Changai [1 ]
机构
[1] Henan Univ Tradit Chinese Med, Inst Informat Technol, Zhengzhou 450000, Peoples R China
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING | 2015年 / 121卷
关键词
Network Intrusion Detection; Data Mining; Data Analysis Technique; Network Structure Optimization and Security; Theoretical Background;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of software applications, from web-based applications to mobile services, is always at risk because of the open society of internet. With the increase in the number of network throughput and security threats, intrusion detection system has attracted much attention in recent years. In this paper, we undertake the research on the principle techniques for network intrusion detection based on data mining and analysis approach. We adopt the prior knowledge on Bayesian network which is a directed acyclic graph, each node represents a random variable and an edge said direct probabilistic dependencies between two connected nodes. Then, we use the traditional risk assessment model to measure the possibility of being hearted. The numeric analysis and experimental illustration indicates the effectiveness of our method compared with other popular adopted state-of-the-art methodologies. In the future, we plan to introduce the graph and complex network theory into our prototype system to enhance the performance.
引用
收藏
页码:513 / 517
页数:5
相关论文
共 10 条
[1]  
Agarwal R, 2000, NETW INTR DET 1 SIAM
[2]  
Cho H, 2009, COMPUTER DIGITAL ENG
[3]  
Fang M L, 2011, MODERN COMPUTER
[4]  
Khoshgoftaar T M, 2007, INT J COMPUTER APPL, P232
[5]  
Kim J H, 2004, ADV COMM TECHN 2004, p303
[6]   Stateful intrusion detection for high-speed networks [J].
Kruegel, C ;
Valeur, F ;
Vigna, G ;
Kemmerer, R .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :285-293
[7]  
PETER L, 2001, Communications network intrusion monitor system uses filter rules and control lists: DE, Patent No. [DE10152010 A1, 10152010]
[8]  
SOMMER R, 2003, P 10 ACM C COMP COMM, P262
[9]  
Xu Biao, 2014, J INEQUAL APPL, P1
[10]  
Zhou J, 2005, COMP SEC APPL C 21 A, P126