首页> 外文期刊>Asian Journal of Information Technology >Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme
【24h】

Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme

机译:基于数据挖掘的网络入侵检测方案的设计与实现

获取原文
           

摘要

A significant security problem for networked systems is hostile trespass by users or software. Intruder is one of the most publicized threats to security. In actual fact, most of the current systems are weak at detecting novel attacks without generating false alarms. Intrusion Detection Systems (IDSs) are increasingly a key part of systems defense. Various approaches to intrusion detection are currently being used which are relatively ineffective. Likewise, data mining plays a driving role in data analysis. This study addresses this issue and proposes a data mining-based intrusion detection system. The data mining techniques being investigated include decision tree (C5.0 algorithm) and distance based clustering (Tow-steps algorithm). The proposed hybrid system combines anomaly and misuse detection. Experiments are performed on both real network data for Sudan University of Science and Technology (SUST) network and Defense Advanced Research Projects Agency (DARPA) dataset which is considered as the most famous available off-line intrusion detection evaluation dataset. The obtained results confirm that data mining is capable of discovering attacks with acceptable level of false alarms.
机译:网络系统的一个重要安全问题是用户或软件的恶意入侵。入侵者是最广为人知的安全威胁之一。实际上,当前大多数系统在检测新型攻击时都不会产生虚假警报,因此功能很弱。入侵检测系统(IDS)日益成为系统防御的关键部分。当前正在使用相对无效的各种入侵检测方法。同样,数据挖掘在数据分析中也起着驱动作用。这项研究解决了这个问题,并提出了一种基于数据挖掘的入侵检测系统。正在研究的数据挖掘技术包括决策树(C5.0算法)和基于距离的聚类(Tow-steps算法)。所提出的混合系统结合了异常和滥用检测。对苏丹科学技术大学(SUST)网络的真实网络数据和国防高级研究计划局(DARPA)数据集均进行了实验,该数据集被认为是最著名的可用离线入侵检测评估数据集。获得的结果证实,数据挖掘能够发现具有可接受水平的错误警报的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号