A Novel Rule-based Intrusion Detection System Using Data Mining

被引:0
|
作者
Li, Lei [1 ]
Yang, De-Zhang [1 ]
Shen, Fang-Cheng [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Automat, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Intrusion Detection; Rule-based; Length-Decreasing Support; Association Rules; Data Mining;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network security is becoming an increasingly important issue, since the rapid development of the Internet. Network Intrusion Detection System (IDS), as the main security defending technique, is widely used against such malicious attacks. Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns from the network traffic data. Association rules and sequence rules are the main technique of data mining for intrusion detection. Considering the classical Apriori algorithm with bottleneck of frequent itemsets mining, we propose a Length-Decreasing Support to detect intrusion based on data mining, which is an improved Apriori algorithm. Experiment results indicate that the proposed method is efficient.
引用
收藏
页码:169 / 172
页数:4
相关论文
共 50 条
  • [41] Use of rule base data mining algorithm for Intrusion Detection
    Elekar, Kailas
    Waghmare, M. M.
    Priyadarshi, Amrit
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [42] Rule-Based Data Mining Cache Replacement Strategy
    Haraty, Ramzi A.
    Zeitouny, Joe
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2013, 9 (01) : 56 - 69
  • [43] Hot News Detection System Using Rule-Based Technique
    Baby, Sahaya John S.
    Kalaiselvi, R.
    MATERIALS TODAY-PROCEEDINGS, 2020, 24 : 2330 - 2338
  • [44] ZigBee IoT Intrusion Detection System: A Hybrid Approach with Rule-based and Machine Learning Anomaly Detection
    Sadikin, Fal
    Kumar, Sandeep
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2020, : 57 - 68
  • [45] Detecting Faulty and Malicious Vehicles Using Rule-based Communications Data Mining
    Rezgui, Jihene
    Cherkaoui, Soumaya
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 827 - 834
  • [46] Rule-Based Analysis of MMPI Data Using the Copernicus System
    Gomula, J.
    Paja, W.
    Pancerz, K.
    Szkola, J.
    HUMAN-COMPUTER SYSTEMS INTERACTION: BACKGROUNDS AND APPLICATIONS 2, PT 2, 2012, 99 : 191 - +
  • [47] Intrusion Detection System using Stream Data Mining and Drift Detection Method
    Kumar, Manish
    Hanumanthappa, M.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [48] Rule-based preprocessing for data stream mining using complex event processing
    Ramirez, Aurora
    Moreno, Nathalie
    Vallecillo, Antonio
    EXPERT SYSTEMS, 2021, 38 (08)
  • [49] Better Interpretable Models for Proteomics Data Analysis Using Rule-Based Mining
    Jayrannejad, Fahrnaz
    Conrad, Tim O. F.
    TOWARDS INTEGRATIVE MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2017, 10344 : 67 - 88
  • [50] Fast Rule-Based Prediction of Data Streams using Associative Classification Mining
    Lakshmi, K. Prasanna
    Reddy, C. R. K.
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,