A model of evolving intrusion detection system based on data mining and immune principle

被引:0
|
作者
Zhao, JZ [1 ]
Xu, MZ [1 ]
Sun, SL [1 ]
You, L [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Sch Sci, Beijing 100083, Peoples R China
来源
TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING | 2004年
关键词
computer network; computer security; intrusion detection; data mining; artificial immune system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, an IDS framework based on Data mining technique and immune principle is presented. Here Data mining technique is used to discover frequently occurred patterns, which are equivalent to self proteins in immune system. Immune principle is explored to generate negative detectors, which does not math any self protein based on distance metric. These negative detectors are distributed into the network system to perform anomaly detection independently and concurrently. Our experiment shows that it has low false positive rate and high detection rate.
引用
收藏
页码:B199 / B202
页数:4
相关论文
共 50 条
  • [31] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [33] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [34] An immune based dynamic intrusion detection model
    LI Tao Department of Computer Science
    Chinese Science Bulletin, 2005, (22) : 2650 - 2657
  • [35] An immune based dynamic intrusion detection model
    Li, T
    CHINESE SCIENCE BULLETIN, 2005, 50 (22): : 2650 - 2657
  • [36] Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach
    Jiang Shan
    Chen Changai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 513 - 517
  • [37] Data Mining for Network Intrusion Detection System in Real Time
    Peng, Tao
    Zuo, Wanli
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 173 - 177
  • [38] A Design and Implementation of Intrusion Detection System by using Data Mining
    Sharma, Brijesh
    Gupta, Huma
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 700 - 704
  • [39] Data Mining based CIDS: Cloud Intrusion Detection System for Masquerade Attacks [DCIDSM]
    Pratik, Jain P.
    Madhu, B. R.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [40] Intrusion Detection System Based on Data Mining Technics for Industrial Networks
    Sapozhnikova, M. U.
    Nikonov, A., V
    Vulfin, A. M.
    2018 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2018,