Realization of Intrusion Detection System based on the Improved Data Mining Technology

被引:0
作者
Zhao Yan Jun [1 ]
Wei Ming Jun [2 ]
Wang Jing
机构
[1] Hebei United Univ, Coll Sci, Tangshan, Peoples R China
[2] Hebei United Univ, Coll Informat Engn, Tangshan, Peoples R China
来源
PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013) | 2013年
关键词
data mining; intrusion detection; improved; K-means algorithm; Apriori algorithm;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
On the basis of further analyzing the operational mechanism of the existing intrusion detection system model, in allusion to the existing problem the powerless, high false negative rate, low detection efficiency and the lack of the rule base automatic extension mechanism to unknown aggressive behavior for existing detection mechanisms, Combining the relevant knowledge of data mining technology, then to design one improved network intrusion detection system model based on data mining, combined misuse detection and anomaly detection. In the model, we select the K-means algorithm in clustering analysis and the Apriori algorithm in association rule mining and improve it. Applying the improved K-means algorithm to achieve normal behavior classes and data separation module, then utilizing the improved Apriori algorithm to achieve automatic extension of the rule base. Finally, by the experiment to verify the function of the two algorithms.
引用
收藏
页码:982 / 987
页数:6
相关论文
共 13 条
[1]  
Cai Jian, 2005, RES IMPLEMENTATION I
[2]  
Chen Yu-hui, 2010, STUDY INTRUSION DETE
[3]  
Chinrungrueng C., 2002, OPTIMAL ADAPTIVE K M
[4]  
Jian-ping Zhang, 2007, Application Research of Computers, V24, P166
[5]  
Li Yang, 2007, Computer Engineering, V33, P154
[6]  
[马晓春 Ma Xiaochun], 2005, [微电子学与计算机, Microelectronics & Computer], V22, P134
[7]  
Sun Ying, 2010, COMPUTER KNOWLEDGE T, P6463
[8]   Intrusion detection techniques and approaches [J].
Verwoerd, T ;
Hunt, R .
COMPUTER COMMUNICATIONS, 2002, 25 (15) :1356-1365
[9]  
Wang Yan, 2010, RES APPL DATA MINING, DOI Anhui
[10]  
Wu Tao, 2010, RES INTRUSION DETECT