Intrusion detection based on data mining

被引:0
作者
Yin, Jian [1 ]
Mei, Fang [1 ]
Zhang, Gang [1 ]
机构
[1] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510275, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS | 2006年 / 4114卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many traditional algorithms use single metric generated by multi-events to detect intrusion by comparison with a certain threshold. In this paper we present a metric vector-based algorithm to detect intrusion while introducing the sample distance for both discrete and continuous data in order to improve the algorithm on heterogeneous dataset. Experiments on MIT lab Data show that the proposed algorithm is effective and efficient.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
[21]   Intrusion detection using data mining [J].
Puthran, Shubha ;
Shah, Ketan .
Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09) :292-306
[22]   Adaptive intrusion detection with data mining [J].
Hossain, M ;
Bridges, SM ;
Vaughn, RB .
2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, :3097-3103
[23]   A Study of Intrusion Detection in Data Mining [J].
Reddy, E. Kesavalu ;
Reddy, V. Naveen ;
Rajulu, P. Govinda .
WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, :1889-1894
[24]   Overview of Data Mining Based Adaptive Intrusion Detection Techniques [J].
Liu, Yangbin ;
Shi, Liang ;
Wang, Beizhan ;
Wang, Panhong .
2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, :702-706
[25]   The WSN intrusion detection method based on deep data mining [J].
Zhang, Yiwei .
Journal of Cyber Security Technology, 2023, 7 (03) :115-133
[26]   Design of Intrusion Detection Model Based on Data Mining Technology [J].
Li Yin-huan .
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, :571-574
[27]   An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques [J].
Haque, Mohd Junedul ;
Magld, Khalid W. ;
Hundewale, Nisar .
2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, :13-17
[28]   Design of Intrusion Detection System Based on Data Mining Algorithm [J].
Song, Changxin ;
Ma, Ke .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, :370-373
[29]   Research on Intrusion Detection System Model Based on Data Mining [J].
Zhu Limiao ;
Huang Hua ;
Zheng Hao .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :113-116
[30]   Framework of intrusion detection based on distributed data mining approach [J].
Lu, Yong ;
Cao, Yang ;
Ling, Jun ;
Li, Li .
Wuhan Daxue Xuebao (Lixue Ban)/Journal of Wuhan University (Natural Science Edition), 2002, 48 (01)