Intrusion detection system based on new association rule mining model

被引:0
作者
Li, TR [1 ]
Pan, WM [1 ]
机构
[1] SW Jiaotong Univ, Dept Math, Chengdu 610031, Peoples R China
来源
2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2 | 2005年
关键词
intrusion detection; association rule; network security; data mining;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection is a problem of great significance to protecting information systems security. Its techniques fail into two general categories: anomaly detection and misuse detection, which complement each other. This research focuses on anomaly detection techniques for intrusion detection. Presently; several approaches based on classical association rule mining have been proposed. for intrusion detection. Because two shortages existed in classical association rule mining problem, namely every itemset is treated equivalently and a uniform minimum support and minimum confidence is used as weighing standard, many rules and uninteresting rules will be generated that causes low effectiveness of intrusion detection. Based on new association rule mining model proposed by Li etc. (2002) that can solve the two shortages at the same time, a new intrusion detection system was proposed. Because the interest of item as a degree is used and the mining algorithm is based on FP-tree, our preliminary experiment results show that the proposed system is more robust and efficient than that based on APRIORI.
引用
收藏
页码:512 / 515
页数:4
相关论文
共 50 条
[31]   Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining [J].
Khamphakdee, Nattawat ;
Benjamas, Nunnapus ;
Saiyod, Saiyan .
JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2015, 8 (03) :234-250
[32]   Integrating Intrusion Detection System and Data Mining [J].
Yusufovna, Sattarova Feruza .
INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, :256-259
[33]   Detection model of network abnormity based on fuzzy association rules for intrusion detection system [J].
Peng, XG ;
Mai, YL ;
Liu, YS ;
Wu, YS .
ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, :4858-4861
[34]   A model for mobile agent based intrusion detection system [J].
Hu, JL ;
Wang, JZ ;
Liu, AZ ;
Yang, SM .
ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2, 2005, :569-574
[35]   Association rule mining in DoS attack detection and defense in the application of network [J].
Zheng, Jigang ;
Zhang, Jingmei .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015), 2015, 8 :445-449
[36]   A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol [J].
Liu, Qi ;
Keller, Hubert B. ;
Hagenmeyer, Veit .
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
[37]   Research on the data-mining-based intrusion detection technology [J].
Li, Guobin .
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, :515-518
[38]   Integrated Rule Mining Based on Fuzzy GNP and Probabilistic Classification for Intrusion Detection [J].
Lu, Nannan ;
Mabu, Shingo ;
Hirasawa, Kotaro .
JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2011, 15 (05) :495-505
[40]   A New Hybrid Algorithm for Association Rule Mining [J].
张敏聪 ;
燕存良 ;
朱开玉 .
Journal of Donghua University(English Edition), 2007, (05) :598-603