The Designation of Intrusion Detection System Model Based on Data Mining

Article Preview

Abstract:

On the basis of further analyzing the operational mechanism of the existing intrusion detection system model, in allusion to the existing problem the powerless ,high false negative rate, low detection efficiency and the lack of the rule base automatic extension mechanism to unknown aggressive behavior for existing detection mechanisms, Combining the relevant knowledge of data mining technology, then to design one improved network intrusion detection system model based on data mining, combined misuse detection and anomaly detection. Finally, we carry out a detailed introduction to the associated modules of work processes and work steps.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3532-3536

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wang Yan, Xiao Wei-min, in: Research on the Application of Data Mining Technique in Intrusion Detection System, edited by Anhui University(2010).

Google Scholar

[2] Verwoerd T, Hunt R: Intrusion detection techniques and approaches, Computer Communications, Vol. 25(15), pp.1356-1365(2002).

DOI: 10.1016/s0140-3664(02)00037-3

Google Scholar

[3] Yu Kun, in: Designs and Implementation of Abnormal Intrusion Detection Based on the High Frequency Statistics, edited by Beijing University of Posts and Telecommunications(2006).

Google Scholar

[4] Cai Jian, in: The Research and Implementation of Intrusion Detection System Based on Artificial Neural Network, edited by Guizhou University(2005).

Google Scholar

[5] Wu Tao, Wang Xin-fang, in: Research of Intrusion Detection Techniques Based on Data Mining , edited by Xi'an University of Technology(2010).

Google Scholar

[6] Chen Yu-hui, Fu Ming, in: Study on Intrusion Detection Technology Base on Data Mining, edited by ChangshaUniversity of Technology(2010).

Google Scholar

[7] LI Yang: K-meansApplication of K-means Clustering Algorithm in Intrusion Detection, Computer Engineering, Vol. 33(14), pp.154-156(2007).

Google Scholar

[8] ZHANG Jian-ping: Application in Cluster's Analysis Is Analyzed in Children Development Period, Application Research of Computers, Vol. 24(5), pp.166-168, (2007).

Google Scholar

[9] Chinrungrueng. C, Sequin, C. H: Optimal adaptive k-means algorithm with dynamic adjustment of learning rate, Columbia University ( 2002).

DOI: 10.1109/ijcnn.1991.155291

Google Scholar

[10] Yan Xiao-guang: Application to Cluster Algorithm in Anomaly Detection of Network Intrusion , Applications of The Computer Systems, Vol. 10(2005), pp.34-37.

Google Scholar

[11] MA Xiao-chun, GAO Xiang, GAO De-yuan: The Application of Cluster Analysis to Intrusion Detection System , Microelectronics & Computer, Vol. 22(4), pp.134-136 , (2005).

Google Scholar

[12] Dj.M. Maric, P.F. Meier and S.K. Estreicher: Mater. Sci. Forum Vol. 83-87 (1992), p.119.

Google Scholar