Intrusion Detection Method based on Frequent Pattern

被引:0
|
作者
Yu, Jie [1 ]
Yao, GuoXiang [1 ]
Zhang, WeiWei [1 ]
机构
[1] Jinan Univ, Coll Informat Technol, Dept Comp Sci, Guangzhou, Guangdong, Peoples R China
来源
ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7 | 2011年 / 204-210卷
关键词
Intrusion Detection; Frequent Pattern; Association Rules; Data Mining;
D O I
10.4028/www.scientific.net/AMR.204-210.1751
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the surging development of the information technology, Intrusion Detection System has been devised for the safety of computer network. This paper focuses on the method of frequent pattern based intrusion detection. A new formula measuring the normal degree of a transaction is presented. We propose a new algorithm to calculate each transaction's normal degree as well as detect intrusions. Experiment results show that the proposed algorithm is competent in detecting intrusions with high detection rate and relatively low false positive rate.
引用
收藏
页码:1751 / 1754
页数:4
相关论文
共 50 条
  • [11] SCADA Intrusion Detection System Based on Temporal Behavior of Frequent Patterns
    Sayegh, Naoum
    Elhajj, Imad H.
    Kayssi, Ayman
    Chehab, Ali
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 432 - 438
  • [12] Intrusion detection system based on speckle pattern analysis
    A. Dhall
    J. K. Chhabra
    N. S. Aulakh
    Experimental Techniques, 2005, 29 : 25 - 31
  • [13] Intrusion detection system based on speckle pattern analysis
    Dhall, A
    Chhabra, JK
    Aulakh, NS
    EXPERIMENTAL TECHNIQUES, 2005, 29 (01) : 25 - 31
  • [14] A pattern matching based network intrusion detection system
    Zhou Chunyue
    Liu Yun
    Zhang Hongke
    2006 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1- 5, 2006, : 1410 - +
  • [15] Research on Intrusion Detection System based on pattern recognition
    Zhu, Youchan
    Zheng, Ying
    NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 609 - 612
  • [16] An Intrusion Detection Method Based on Outlier Ensemble Detection
    Huang, Bin
    Li, Wen-fang
    Chen, De-li
    Shi, Liang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 600 - +
  • [17] Mining maximal frequent itemsets for intrusion detection
    Wang, H
    Li, QH
    Xiong, HY
    Jiang, SY
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 422 - 429
  • [18] A Novel Weighted Frequent Pattern-Based Outlier Detection Method Applied to Data Stream
    Yuan, Gang
    Cai, Saihua
    Hao, Shangbo
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2019, : 503 - 510
  • [19] Anomaly intrusion detection method based on HMM
    Qiao, Y
    Xin, XW
    Bin, Y
    Ge, S
    ELECTRONICS LETTERS, 2002, 38 (13) : 663 - 664
  • [20] An intrusion detection method based on SVM and KPCA
    Li, Yuan-Cheng
    Wang, Zhong-Qiang
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1462 - 1466