Study on Intrusion Detection System Based on Data Mining

Article Preview

Abstract:

Intrusion detection system as a proactive network security technology, is necessary and reasonable to add a static defense. However, the traditional exceptions and errors detecting exist issues of leakage police, the false alarm rate or maintenance difficult. In this paper, The intrusion detection system based on data mining with statistics, machine learning techniques in the detection performance, robustness, self-adaptability has a great advantage. The system improves the K-means clustering algorithm, focus on solving two questions of the cluster center node selection and discriminating of clustering properties, the test shows that the system further enhance the detection efficiency of the system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2499-2502

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yuqing Yuan. Research on Intrusion Detection based on Data Mining[J]. Computer Security, 2014, (7): 14.

Google Scholar

[2] Yingying Feng. Data mining applied to intrusion detection[J]. Chongqing Academy of Sciences, 2014, 16(4): 158-159.

Google Scholar

[3] Kezhu Zhang. Research and Application of Campus Network Intrusion Detection System Based on Data Mining[J]. Journal of Hebei North University, 2014, 30 (3): 28-29.

Google Scholar

[4] Songtao Li. Ant colony clustering algorithm based on data mining techniques in network intrusion detection[J]. Computer Knowledge Technology, 2014, 10(4): 707-708.

Google Scholar

[5] Lu Jing. Application of data mining technology in the new network intrusion detection model[J]. Electric Technology &Software Engineer, 2014, (3): 213.

Google Scholar

[6] Jin Yi. An intrusion detection method based on data mining[J]. Electric Technology &Software Engineer, 2014, (7): 227.

Google Scholar

[7] Li Yuan. Data mining to explore information security under intelligent intrusion detection system[J]. Journal of Taiyuan University, 2014, 15(1): 133.

Google Scholar

[8] Aihua Qi, Shucai Song. The Application of Data Mining Technology in Computer Intrusion Detection[J]. Bulletin of Science and Technology, 2013, 29 (10): 10.

Google Scholar