Research into the Network Security Model Blended of Data Stream Mining and Intrusion Detection System

被引:0
作者
Zhu Lin [1 ]
Zhu Can-Shi [1 ]
机构
[1] Air Force Univ Engn, Engn Coll, Xian, Peoples R China
来源
PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI | 2012年
关键词
Intrusion Detection; Data Stream Mining; Network Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In response of the fact that traditional intrusion detection systems are not able to fulfill the requirements for specific network security, such as fast processing speed, stronger defense capability, and higher real-time performance, a model of network security defense is built on the integration of data stream mining and intrusion detection; and, a data stream clustering algorithm is designed for mining in the model. Through analysis and simulation, the model turns out to be higher in detection rate and lower in false-alarming or false negative rate, thus achieving a better result.
引用
收藏
页码:496 / 499
页数:4
相关论文
共 5 条
[1]  
Ji Lei, 2007, RES DATA MINING BASE
[2]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[3]  
Tang Zhengjun, 2002, COMPUTER APPL RES, V23, P25
[4]  
Wang Baoping, 2006, NANYANG NORMAL COLL, V12, P26
[5]  
Xu Yonghong, 2002, COMPUTER ENG APPL, V11, P24