Intrusion detection based on data mining

被引:0
作者
Yin, Jian [1 ]
Mei, Fang [1 ]
Zhang, Gang [1 ]
机构
[1] Sun Yat Sen Univ, Dept Comp Sci, Guangzhou 510275, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS | 2006年 / 4114卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many traditional algorithms use single metric generated by multi-events to detect intrusion by comparison with a certain threshold. In this paper we present a metric vector-based algorithm to detect intrusion while introducing the sample distance for both discrete and continuous data in order to improve the algorithm on heterogeneous dataset. Experiments on MIT lab Data show that the proposed algorithm is effective and efficient.
引用
收藏
页码:724 / 729
页数:6
相关论文
共 50 条
[31]   A novel adaptive intrusion detection system based on data mining [J].
Yu, ZX ;
Chen, JR ;
Zhu, TQ .
PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, :2390-2395
[32]   Research and Design on Intrusion Detection System Based on Data Mining [J].
Song, Guoqin ;
Guo, Yuanhui ;
Qiu, Qianxi .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, :188-194
[33]   Real time data mining-based intrusion detection [J].
Lee, W ;
Stolf, SJ ;
Chan, PK ;
Eskin, E ;
Fan, W ;
Miller, M ;
Hershkop, S ;
Zhang, JX .
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, :89-100
[34]   Algorithm of Intrusion Detection Based on Data Mining and Its Implementation [J].
孙海彬 ;
徐良贤 ;
陈彦华 .
Journal of DongHua University, 2004, (05) :88-92
[35]   Intrusion Detection System Based on data mining for Host Log [J].
Zhu, Ming ;
Huang, ZiLi .
2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, :1742-1746
[36]   Data Mining Based Network Intrusion Detection System: A Survey [J].
Helali, Rasha G. Mohammed .
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, :501-505
[37]   A Model of Intrusion Detection Based on Data Mining in Campus Network [J].
Qi Bei ;
Dong Yun-feng .
NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, :317-+
[38]   Design of data mining-based intrusion detection system [J].
Su, MD ;
Liu, DQ ;
Li, YF .
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2, 2005, :93-95
[39]   Research on a Network Intrusion Detection System Based on Data Mining [J].
Fang, Zhongjin ;
Zhou, Shu .
2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 :204-209
[40]   Network intrusion detection based on system calls and data mining [J].
Tian, Xinguang ;
Cheng, Xueqi ;
Duan, Miyi ;
Liao, Rui ;
Chen, Hong ;
Chen, Xiaojuan .
FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04) :522-528