Application of data mining technology to intrusion detection system

被引:0
|
作者
Xia, HX [1 ]
Qi, S [1 ]
Rui, H [1 ]
机构
[1] Wuhan Univ Technol, Wuhan 430070, Hubei Province, Peoples R China
关键词
intrusion detection; data mining; association rules; and frequent episodes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Based the analysis of current Intrusion Detection technologies, the paper introduces the Data Mining Technology to the Intrusion Detection System, proposes a system architecture as well as a pattern strategy of automatic update. By adopting the Data Mining Technology, the frequency patterns could be dug out from a mass of network events. So, effective examination rules could be discovered, which would be then used to instruct the analysis of IDS network intrusion. Meanwhile, the usage of the pattern strategy of automatic update that adopts the ways of network real-time analysis has improved the efficiency and the veracity of the mining greatly. The integration of them would be effective in solving the problem of high misreport and false alerts rate in the traditional Intrusion Detection Systems.
引用
收藏
页码:1027 / 1030
页数:4
相关论文
共 50 条
  • [1] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
  • [2] The Analysis of Application of Data Mining Technology in the System of Intrusion Detection
    Liu, Zhijun
    Pu, Xiaowei
    PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 28, 2014, 28 : 75 - 78
  • [3] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [4] Application Research on Data Mining Algorithm in Intrusion Detection System
    Wu, Weizu
    Liu, Liqun
    Xu, Bing
    3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 607 - 612
  • [5] Realization of Intrusion Detection System based on the Improved Data Mining Technology
    Zhao Yan Jun
    Wei Ming Jun
    Wang Jing
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 982 - 987
  • [6] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [7] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [8] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [9] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [10] Research on Network Intrusion Detection Technology Based on Data Mining Technology
    Zhou, Lijun
    Lv, Hong
    Zhao, Yuan
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 444 - 450