The Application Research of Data Mining in the Intrusion Detection

Article Preview

Abstract:

With the popularization of computer technology and application and popularization, the network technology has been widely used, the resulting network security issues are also increasingly prominent, to the network itself and the information system based on network constitutes the great potential safety hazard. This paper expounds the concept of intrusion detection and data mining, the commonly used invasion detection technology and models, and analyzes the application of data mining technology in intrusion detection system, to provide reference for the optimization and perfection of the network intrusion detection system and using for reference.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1176-1179

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R. Buyya, C.S. Yeo, and S. Venugopal: Future Generation computer systems, Vol. 25(2009) No. 6, p.599.

Google Scholar

[2] G. Wei, A.V. Vasilakos, and Y. Zheng: The Journal of Supercomputing, Vol. 54(2010) No. 2, p.252.

Google Scholar

[3] Y. Fang, and F. Wang, Ge J. Web Information Systems and Mining (Springer Berlin Heidelberg, 2010), p.271.

Google Scholar

[4] Q. Zhang, L. Cheng, and R. Boutaba: Journal of internet services and applications, Vol. 1(2010) No. 1, p.7.

Google Scholar

[5] M.D. Dikaiakos, D. Katsaros, and P. Mehra: Internet Computing, Vol. 13(2009) No. 5, p.10.

Google Scholar