Intrusion detection system based on new association rule mining model

被引:0
作者
Li, TR [1 ]
Pan, WM [1 ]
机构
[1] SW Jiaotong Univ, Dept Math, Chengdu 610031, Peoples R China
来源
2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2 | 2005年
关键词
intrusion detection; association rule; network security; data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is a problem of great significance to protecting information systems security. Its techniques fail into two general categories: anomaly detection and misuse detection, which complement each other. This research focuses on anomaly detection techniques for intrusion detection. Presently; several approaches based on classical association rule mining have been proposed. for intrusion detection. Because two shortages existed in classical association rule mining problem, namely every itemset is treated equivalently and a uniform minimum support and minimum confidence is used as weighing standard, many rules and uninteresting rules will be generated that causes low effectiveness of intrusion detection. Based on new association rule mining model proposed by Li etc. (2002) that can solve the two shortages at the same time, a new intrusion detection system was proposed. Because the interest of item as a degree is used and the mining algorithm is based on FP-tree, our preliminary experiment results show that the proposed system is more robust and efficient than that based on APRIORI.
引用
收藏
页码:512 / 515
页数:4
相关论文
共 50 条
[21]   A Model of Intrusion Detection Based on Data Mining in Campus Network [J].
Qi Bei ;
Dong Yun-feng .
NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, :317-+
[22]   Network intrusion detection based on system calls and data mining [J].
Tian, Xinguang ;
Cheng, Xueqi ;
Duan, Miyi ;
Liao, Rui ;
Chen, Hong ;
Chen, Xiaojuan .
FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04) :522-528
[23]   Network intrusion detection based on system calls and data mining [J].
Xinguang Tian ;
Xueqi Cheng ;
Miyi Duan ;
Rui Liao ;
Hong Chen ;
Xiaojuan Chen .
Frontiers of Computer Science in China, 2010, 4 :522-528
[24]   Research on Immune based Adaptive Intrusion Detection System Model [J].
Deng, Lei ;
Gao, De-yuan .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, :488-491
[25]   The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection [J].
Ye Changguo ;
Wei Nianzhong ;
Wang Tailei ;
Zhang Qin ;
Zhu Xiaorong .
PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, :849-+
[26]   Cyber intrusion detection through association rule mining on multi-source logs [J].
Lou, Ping ;
Lu, Guantong ;
Jiang, Xuemei ;
Xiao, Zheng ;
Hu, Jiwei ;
Yan, Junwei .
APPLIED INTELLIGENCE, 2021, 51 (06) :4043-4057
[27]   Cyber intrusion detection through association rule mining on multi-source logs [J].
Ping Lou ;
Guantong Lu ;
Xuemei Jiang ;
Zheng Xiao ;
Jiwei Hu ;
Junwei Yan .
Applied Intelligence, 2021, 51 :4043-4057
[28]   Realization of Intrusion Detection System based on the Improved Data Mining Technology [J].
Zhao Yan Jun ;
Wei Ming Jun ;
Wang Jing .
PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, :982-987
[29]   Data mining for intrusion detection [J].
Liu, DH ;
Wang, HZ ;
Wang, XM .
2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, :E7-E12
[30]   A New Data-Mining Based Approach for Network Intrusion Detection [J].
Dartigue, Christine ;
Jang, Hyun Ik ;
Zeng, Wenjun .
2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, :372-377