Association rule mining in DoS attack detection and defense in the application of network

被引:0
|
作者
Zheng, Jigang [1 ]
Zhang, Jingmei [2 ]
机构
[1] Baoshan Coll, Dept Math, Baoshan 678000, Yunnan, Peoples R China
[2] Lib Baoshan Coll, Baoshan 678000, Yunnan, Peoples R China
关键词
Association rule; Intrusion detection; Data mining; Characteristic attribute; KDDCup99;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Association rule mining is widely used in network intrusion detection,an important feature of attribute extraction of KDDCup99 data set of denial of service attack records,for the association rules mining association rules between different attributes with the help of Weka,the intrusion detection and prevention of further study has reference significance.Mining association rules reflect the relationship between different attributes,the establishment of the intrusion detection system is effective and adaptive for the next step,has a very broad application prospects.
引用
收藏
页码:445 / 449
页数:5
相关论文
共 50 条
  • [41] Application of association rule mining in supplier selection criteria
    Haery, A.
    Salmasi, N.
    Modarres Yazdi, M.
    Iranmanesh, H.
    World Academy of Science, Engineering and Technology, 2009, 40 : 358 - 362
  • [42] Application of formal concept analysis in association rule mining
    Liu, Yong
    Li, Xueqing
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 203 - 207
  • [43] Application of particle swarm optimization to association rule mining
    Kuo, R. J.
    Chao, C. M.
    Chiu, Y. T.
    APPLIED SOFT COMPUTING, 2011, 11 (01) : 326 - 336
  • [44] An efficient association rule mining algorithm and business application
    Zhang, Zheng
    Wang, Hui-Wen
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 959 - +
  • [45] Application of Computational Verb Theory to Association Rule Mining
    Cai, Alian
    Yang, Tao
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [46] Defense against DoS Attack: PSO Approach in Virtualization
    Mercyshalinie, S.
    Madhupriya, G.
    Vairamani, S.
    Velayutham, S.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 199 - 204
  • [47] Integrating association rule mining and decision tree learning for network intrusion detection: A preliminary investigation
    Hossain, M
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMPUTER SCIENCE II, 2002, : 65 - 70
  • [48] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 143 - 146
  • [49] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 233 - +
  • [50] Learning disjointness axioms with association rule mining and its application to inconsistency detection of linked data
    Ma, Yanfang
    Gao, Huan
    Wu, Tianxing
    Qi, Guilin
    Communications in Computer and Information Science, 2014, 480 : 29 - 41