Some similarity coefficients and application of data mining techniques to the anomaly-based IDS

被引:0
|
作者
Evgeniya Nikolova
Veselina Jecheva
机构
[1] Burgas Free University,Faculty for Computer Science and Engineering
来源
Telecommunication Systems | 2012年 / 50卷
关键词
Intrusion detection; Anomaly-based IDS; Data mining; Classification tree; Similarity coefficients;
D O I
暂无
中图分类号
学科分类号
摘要
This paper introduces an approach to anomaly-based intrusion detection, which searches the system activity data for deviations from preliminarily described profiles of normal activity. The normal system activity in the proposed methodology is described using data mining techniques, namely classification trees. The intrusion detection is performed using some similarity coefficients with a purpose to measure the similarity between the normal activity and the current one. The evaluation of the represented simulation results indicates the proposed methodology produces reliable and steady results.
引用
收藏
页码:127 / 135
页数:8
相关论文
共 50 条
  • [31] Application of Data Mining Techniques in Universal Design
    Zhang, Fangyan
    Liang, Hao
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 179 - 182
  • [32] Application of data mining techniques to load profiling
    Pitt, BD
    Kirschen, DS
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON POWER INDUSTRY COMPUTER APPLICATIONS, 1999, : 131 - 136
  • [33] Anomaly Detection in Admission or Selection Examinations using Data Mining Techniques
    Ashaduzzaman, Md
    Roy, Shanto
    Zaman, Shihabuz
    Ferdaus, Abu Ahmed
    2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
  • [34] AN APPLICATION OF SELECTED DATA MINING TECHNIQUES TO THE SPECIFIC SPORT DATA
    Gorecki, Jan
    ICT FOR COMPETITIVENESS 2012, 2012, : 118 - 123
  • [35] Anomaly-based error and intrusion detection in tabular data: No DNN outperforms tree-based classifiers
    Zoppi, Tommaso
    Gazzini, Stefano
    Ceccarelli, Andrea
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 160 : 951 - 965
  • [36] Algorithm Optimization of Anomaly Detection Based on Data Mining
    Zhang, Lei
    Chen, Yong
    Liao, Shaowen
    2018 10TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2018, : 402 - 404
  • [37] A Survey of Some Classic Data Mining Techniques and Applications
    Qiang, Xinjian
    Xiao, Hong
    Li, Zhen
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 174 - 177
  • [38] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
  • [39] Data Mining techniques application in Power Distribution utilities
    Ramos, Sergio
    Vale, Zita
    2008 IEEE/PES TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION, VOLS 1-3, 2008, : 1156 - +
  • [40] How Much Training Data is Enough? A Case Study for HTTP Anomaly-Based Intrusion Detection
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Estepa, Antonio
    Madinabeitia, German
    IEEE ACCESS, 2020, 8 (44410-44425) : 44410 - 44425