Intrusion detection based on data mining

被引:0
作者
Yin, Jian [1 ]
Mei, Fang [1 ]
Zhang, Gang [1 ]
机构
[1] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510275, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS | 2006年 / 4114卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many traditional algorithms use single metric generated by multi-events to detect intrusion by comparison with a certain threshold. In this paper we present a metric vector-based algorithm to detect intrusion while introducing the sample distance for both discrete and continuous data in order to improve the algorithm on heterogeneous dataset. Experiments on MIT lab Data show that the proposed algorithm is effective and efficient.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
  • [21] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306
  • [22] A Study of Intrusion Detection in Data Mining
    Reddy, E. Kesavalu
    Reddy, V. Naveen
    Rajulu, P. Govinda
    WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
  • [23] Adaptive intrusion detection with data mining
    Hossain, M
    Bridges, SM
    Vaughn, RB
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3097 - 3103
  • [24] The WSN intrusion detection method based on deep data mining
    Zhang, Yiwei
    Journal of Cyber Security Technology, 2023, 7 (03) : 115 - 133
  • [25] Network Intrusion Detection System Model Based on Data Mining
    Zhao, Yanjie
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 155 - 160
  • [26] Research on the data-mining-based intrusion detection technology
    Li, Guobin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 515 - 518
  • [27] Network intrusion detection based on system calls and data mining
    Xinguang Tian
    Xueqi Cheng
    Miyi Duan
    Rui Liao
    Hong Chen
    Xiaojuan Chen
    Frontiers of Computer Science in China, 2010, 4 : 522 - 528
  • [28] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [29] Network intrusion detection based on system calls and data mining
    Tian, Xinguang
    Cheng, Xueqi
    Duan, Miyi
    Liao, Rui
    Chen, Hong
    Chen, Xiaojuan
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
  • [30] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100