Some similarity coefficients and application of data mining techniques to the anomaly-based IDS

被引:0
|
作者
Evgeniya Nikolova
Veselina Jecheva
机构
[1] Burgas Free University,Faculty for Computer Science and Engineering
来源
Telecommunication Systems | 2012年 / 50卷
关键词
Intrusion detection; Anomaly-based IDS; Data mining; Classification tree; Similarity coefficients;
D O I
暂无
中图分类号
学科分类号
摘要
This paper introduces an approach to anomaly-based intrusion detection, which searches the system activity data for deviations from preliminarily described profiles of normal activity. The normal system activity in the proposed methodology is described using data mining techniques, namely classification trees. The intrusion detection is performed using some similarity coefficients with a purpose to measure the similarity between the normal activity and the current one. The evaluation of the represented simulation results indicates the proposed methodology produces reliable and steady results.
引用
收藏
页码:127 / 135
页数:8
相关论文
共 50 条
  • [21] Systematic Literature Survey on IDS Based on Data Mining
    Pushpam, C. Amali
    Jayanthi, J. Gnana
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 850 - 860
  • [22] The Calculation of Similarity and Its Application in Data Mining
    Teng, Shaohua
    Li, Junlei
    Li, Rigui
    Zhang, Wei
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 563 - 574
  • [24] Application of data mining techniques in pharmacovigilance
    Wilson, AM
    Thabane, L
    Holbrook, A
    BRITISH JOURNAL OF CLINICAL PHARMACOLOGY, 2004, 57 (02) : 127 - 134
  • [25] A Survey on Blockchain Anomaly Detection Using Data Mining Techniques
    Li, Ji
    Gu, Chunxiang
    Wei, Fushan
    Chen, Xi
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 491 - 504
  • [26] Synergy of Blockchain Technology and Data Mining Techniques for Anomaly Detection
    Kamisalic, Aida
    Kramberger, Renata
    Fister, Iztok, Jr.
    APPLIED SCIENCES-BASEL, 2021, 11 (17):
  • [27] Incremental Anomaly-based Intrusion Detection System Using Limited Labeled Data
    Alaei, Parisa
    Noorbehbahani, Fakhroddin
    2017 3RD INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2017, : 178 - 184
  • [28] Real Anomaly Detection in Telecommunication Multidimensional Data Using Data Mining Techniques
    Choros, Kazimierz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT I, 2010, 6421 : 11 - 19
  • [29] Application of a Classifier Based on Data Mining Techniques in Water Supply Operation
    Ji, Yi
    Lei, Xiaohui
    Cai, Siyu
    Wang, Xu
    WATER, 2016, 8 (12):
  • [30] ADMIDS: A new type of IDS based on agent data-mining
    Lee, Y
    Wang, W
    Luo, JZ
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL III, PTS A AND B, 2002, 3 : 743 - 749