Intrusion detection system based on new association rule mining model

被引:0
作者
Li, TR [1 ]
Pan, WM [1 ]
机构
[1] SW Jiaotong Univ, Dept Math, Chengdu 610031, Peoples R China
来源
2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2 | 2005年
关键词
intrusion detection; association rule; network security; data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is a problem of great significance to protecting information systems security. Its techniques fail into two general categories: anomaly detection and misuse detection, which complement each other. This research focuses on anomaly detection techniques for intrusion detection. Presently; several approaches based on classical association rule mining have been proposed. for intrusion detection. Because two shortages existed in classical association rule mining problem, namely every itemset is treated equivalently and a uniform minimum support and minimum confidence is used as weighing standard, many rules and uninteresting rules will be generated that causes low effectiveness of intrusion detection. Based on new association rule mining model proposed by Li etc. (2002) that can solve the two shortages at the same time, a new intrusion detection system was proposed. Because the interest of item as a degree is used and the mining algorithm is based on FP-tree, our preliminary experiment results show that the proposed system is more robust and efficient than that based on APRIORI.
引用
收藏
页码:512 / 515
页数:4
相关论文
共 50 条
  • [21] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +
  • [22] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
  • [23] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [24] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491
  • [25] The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection
    Ye Changguo
    Wei Nianzhong
    Wang Tailei
    Zhang Qin
    Zhu Xiaorong
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 849 - +
  • [26] Cyber intrusion detection through association rule mining on multi-source logs
    Lou, Ping
    Lu, Guantong
    Jiang, Xuemei
    Xiao, Zheng
    Hu, Jiwei
    Yan, Junwei
    APPLIED INTELLIGENCE, 2021, 51 (06) : 4043 - 4057
  • [27] Realization of Intrusion Detection System based on the Improved Data Mining Technology
    Zhao Yan Jun
    Wei Ming Jun
    Wang Jing
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 982 - 987
  • [28] Cyber intrusion detection through association rule mining on multi-source logs
    Ping Lou
    Guantong Lu
    Xuemei Jiang
    Zheng Xiao
    Jiwei Hu
    Junwei Yan
    Applied Intelligence, 2021, 51 : 4043 - 4057
  • [29] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [30] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377