Intrusion detection system based on new association rule mining model

被引:0
|
作者
Li, TR [1 ]
Pan, WM [1 ]
机构
[1] SW Jiaotong Univ, Dept Math, Chengdu 610031, Peoples R China
来源
2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2 | 2005年
关键词
intrusion detection; association rule; network security; data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is a problem of great significance to protecting information systems security. Its techniques fail into two general categories: anomaly detection and misuse detection, which complement each other. This research focuses on anomaly detection techniques for intrusion detection. Presently; several approaches based on classical association rule mining have been proposed. for intrusion detection. Because two shortages existed in classical association rule mining problem, namely every itemset is treated equivalently and a uniform minimum support and minimum confidence is used as weighing standard, many rules and uninteresting rules will be generated that causes low effectiveness of intrusion detection. Based on new association rule mining model proposed by Li etc. (2002) that can solve the two shortages at the same time, a new intrusion detection system was proposed. Because the interest of item as a degree is used and the mining algorithm is based on FP-tree, our preliminary experiment results show that the proposed system is more robust and efficient than that based on APRIORI.
引用
收藏
页码:512 / 515
页数:4
相关论文
共 50 条
  • [1] Association rule mining in intrusion detection systems
    Zhao, D
    Lu, YS
    APOC 2003: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS, PTS 1 AND 2, 2003, 5282 : 577 - 581
  • [2] The Intrusion Detection System Based on a Novel Association Rule
    Gu, Baoping
    Guo, Honyan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1312 - 1315
  • [3] A Novel Rule-based Intrusion Detection System Using Data Mining
    Li, Lei
    Yang, De-Zhang
    Shen, Fang-Cheng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
  • [4] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [5] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [6] Mining Association Rules for Intrusion Detection
    Wang, Hui
    Zhang, Guoping
    Chen, Huiguo
    Jiang, Xueshu
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 644 - +
  • [7] A framework for the application of association rule mining in large intrusion detection infrastructures
    Treinen, James J.
    Thurimella, Ramakrishna
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 1 - 18
  • [8] A Novel Intrusion Detection System Based on Data Mining
    Xu Tao
    Zhang Wei
    Li XuHong
    Wang Xia
    Pan Wenwen
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
  • [9] An Association Mining Model for Intrusion Detection
    Yin, Yunfei
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4579 - 4584
  • [10] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218