Application of data mining technology to intrusion detection system

被引:0
|
作者
Xia, HX [1 ]
Qi, S [1 ]
Rui, H [1 ]
机构
[1] Wuhan Univ Technol, Wuhan 430070, Hubei Province, Peoples R China
关键词
intrusion detection; data mining; association rules; and frequent episodes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Based the analysis of current Intrusion Detection technologies, the paper introduces the Data Mining Technology to the Intrusion Detection System, proposes a system architecture as well as a pattern strategy of automatic update. By adopting the Data Mining Technology, the frequency patterns could be dug out from a mass of network events. So, effective examination rules could be discovered, which would be then used to instruct the analysis of IDS network intrusion. Meanwhile, the usage of the pattern strategy of automatic update that adopts the ways of network real-time analysis has improved the efficiency and the veracity of the mining greatly. The integration of them would be effective in solving the problem of high misreport and false alerts rate in the traditional Intrusion Detection Systems.
引用
收藏
页码:1027 / 1030
页数:4
相关论文
共 50 条
  • [21] Data mining based design for the detection engine of the intrusion detection system
    Lu, Xi-Xiang
    Yang, Bo
    Pei, Chang-Xing
    Su, Xiao-Long
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (04): : 574 - 580
  • [22] Application of data mining technology in detecting network intrusion and security maintenance
    Zhu, Yongkuan
    Gaba, Gurjot Singh
    Almansour, Fahad M.
    Alroobaea, Roobaea
    Masud, Mehedi
    JOURNAL OF INTELLIGENT SYSTEMS, 2021, 30 (01) : 664 - 676
  • [23] Research on the application of honeypot technology in Intrusion Detection System
    Suo, Xiangfeng
    Han, Xue
    Gao, Yunhui
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 1030 - 1032
  • [24] A novel adaptive intrusion detection system based on data mining
    Yu, ZX
    Chen, JR
    Zhu, TQ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395
  • [25] A Design and Implementation of Intrusion Detection System by using Data Mining
    Sharma, Brijesh
    Gupta, Huma
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 700 - 704
  • [26] Research and Design on Intrusion Detection System Based on Data Mining
    Song, Guoqin
    Guo, Yuanhui
    Qiu, Qianxi
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 188 - 194
  • [27] Research of Data mining in Intrusion Detection System and the uncertainty of the attack
    Liu, Wei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1305 - 1308
  • [28] Design of Intrusion Detection System Based on Data Mining Algorithm
    Song, Changxin
    Ma, Ke
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 370 - 373
  • [29] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [30] Data Mining Based Network Intrusion Detection System: A Survey
    Helali, Rasha G. Mohammed
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 501 - 505