期刊文献+

Building Real-Time Network Intrusion Detection System Based on Parallel Time-Series Mining Techniques

Building Real-Time Network Intrusion Detection System Based on Parallel Time-Series Mining Techniques
下载PDF
导出
摘要 A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to describe network events, and sliding window updating algorithm is used to maintain network stream. Moreover, parallel frequent patterns and frequent episodes mining algorithms are applied to implement parallel time-series mining engineer which can intelligently generate rules to distinguish intrusions from normal activities. Analysis and study on the basis of DAWNING 3000 indicate that this parallel time-series mining-based model provides a more accurate and efficient way to building real-time NIDS. A new real-time model based on parallel time-series mining is proposed to improve the accuracy and efficiency of the network intrusion detection systems. In this model, multidimensional dataset is constructed to describe network events, and sliding window updating algorithm is used to maintain network stream. Moreover, parallel frequent patterns and frequent episodes mining algorithms are applied to implement parallel time-series mining engineer which can intelligently generate rules to distinguish intrusions from normal activities. Analysis and study on the basis of DAWNING 3000 indicate that this parallel time-series mining-based model provides a more accurate and efficient way to building real-time NIDS.
作者 赵峰 李庆华
出处 《Journal of Southwest Jiaotong University(English Edition)》 2005年第1期11-17,共7页 西南交通大学学报(英文版)
基金 TheNationalNaturalScienceFoundationofChina(No.60273075).
关键词 Intrusion detection Time-series mining Sliding window Parallel algorithm Intrusion detection Time-series mining Sliding window Parallel algorithm
  • 相关文献

参考文献6

  • 1Datar M,Gionis A,Indyk P,et al.Maintaining stream statistics over sliding window[].In: Eppstein D Demaine E ed ACM-SIAM Symposium on Discrete Algorithms ( SODA) San Francisco California New York: ACM/SIAM Press.2002
  • 2Lian Y F,Dai Y X,Wang H.Anomaly detection of user behaviors based on profile mining[].Chinese Journal of Computers.2002
  • 3Lin Q,Agrawal D,Abbadi E.Supporting sliding window queries for continuous data streams[].In: Aggrawal CBeard K ed Proceedings of the th Conference on Scientific and Statistical Database Management( SSDBM’ ) Cambridge Massachusetts New York:Springer Verlag GmbH.2003
  • 4Lee W,Stoifo S J.Data mining approaches for intrusion detection[].In: Adams C Balenson D ed Proceedings of the th USENIX Security Symposium San Antonio Texas: USENIX publishing.1998
  • 5LEE W,Stoifo S J,Mok K W.A data mining framework for building intrusion detection models[].In: Warrender C Forrest S ed Proceedings of the IEEE Symposium on Security and Privacy Oakland Los Alamitos California: IEEE Computer Society Press.1999
  • 6Guha S,Koudas N.Approximating a data stream for querying and estimation: algorithms and performance evaluation[].In: Proceedings of the th ICDE Conference San Jose CA San Jose: IEEE Computer Society.2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部