A model of evolving intrusion detection system based on data mining and immune principle

被引:0
|
作者
Zhao, JZ [1 ]
Xu, MZ [1 ]
Sun, SL [1 ]
You, L [1 ]
机构
[1] Beijing Univ Aeronaut & Astronaut, Sch Sci, Beijing 100083, Peoples R China
来源
TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING | 2004年
关键词
computer network; computer security; intrusion detection; data mining; artificial immune system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, an IDS framework based on Data mining technique and immune principle is presented. Here Data mining technique is used to discover frequently occurred patterns, which are equivalent to self proteins in immune system. Immune principle is explored to generate negative detectors, which does not math any self protein based on distance metric. These negative detectors are distributed into the network system to perform anomaly detection independently and concurrently. Our experiment shows that it has low false positive rate and high detection rate.
引用
收藏
页码:B199 / B202
页数:4
相关论文
共 50 条
  • [41] The Development of Computer Network Intrusion Detection System Based on Data Mining
    Shan, Chen
    MECHANICAL, MATERIALS AND MANUFACTURING ENGINEERING, PTS 1-3, 2011, 66-68 : 2248 - 2251
  • [42] The algorithm design of agent for detecting and analyzing data in intrusion detection based on immune principle
    Chen Zhongmin
    Wang Yu
    Xu Baowen
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1779 - +
  • [43] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [44] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [45] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [46] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447
  • [47] Research on the data-mining-based intrusion detection technology
    Li, Guobin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 515 - 518
  • [48] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [49] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100
  • [50] Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
    孙海彬
    徐良贤
    陈彦华
    Journal of Donghua University(English Edition), 2004, (05) : 88 - 92