期刊文献+

Algorithm of Intrusion Detection Based on Data Mining and Its Implementation

Algorithm of Intrusion Detection Based on Data Mining and Its Implementation
下载PDF
导出
摘要 Intrusion detection is regarded as classification in data mining field. However instead of directly mining the classification rules, class association rules, which are then used to construct a classifier, are mined from audit logs. Some attributes in audit logs are important for detecting intrusion but their values are distributed skewedly. A relative support concept is proposed to deal with such situation. To mine class association rules effectively, an algorithms based on FP-tree is exploited. Experiment result proves that this method has better performance. Intrusion detection is regarded as classification in data mining field. However instead of directly mining the classification rules, class association rules, which are then used to construct a classifier, are mined from audit logs. Some attributes in audit logs are important for detecting intrusion but their values are distributed skewedly. A relative support concept is proposed to deal with such situation. To mine class association rules effectively, an algorithms based on FP-tree is exploited. Experiment result proves that this method has better performance.
出处 《Journal of Donghua University(English Edition)》 EI CAS 2004年第5期88-92,共5页 东华大学学报(英文版)
基金 The work is supported by Chinese NSF(Project No.60073034)
关键词 入侵检测 数据采集 分类规则 网络安全 Intrusion detection ,data mining ,association rules ,FP-Tree
  • 相关文献

参考文献7

  • 1DanielBarbara,JuliaCoutoSushil,Jajodia,LeonardPopyack,NingningWu.ADAM:Detecting intrusions bydata mining[].Proceedings of theIEEE workshop onInformationAssurance andSecurity.2001
  • 2B.Liu,W.Hsu,Y.Ma. Proc. of1998Int.Conf. onKnowledgeDiscovery andDataMining(KDD 98) . 1998
  • 3J.Han,J.Pei,Y.Yin. Proc.2000ACM SIGMOD Int.Conf.Management ofData . 2000
  • 4Fayyad,U.M,Irani,K.B. InternationalJointConferences onArtificialIntelligence . 1993
  • 5W. W. Cohen.Fast effective rule induction[].Machine Learning : the th International Conference Lake TahoCA.1995
  • 6K Wang,S Zhou,Y He.Growing decision t ree on support-less association rules[].Proc of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD’’).2000
  • 7R. Lip Mann,R. K. Cunningham,D. J. Fried,K. R. Kendall,S. E. Webster,M. A. Zissman.Results of the DARPA 1998 Offline Intrusion Detection Evaluation[].Proc RAID.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部