The Application of High Dimensional Data Mining Based on Big Data to Intrusion Detection

被引:0
|
作者
Liu, Jinhua [1 ]
机构
[1] Xinyu Univ, Modern Educ Technol Ctr, Xinyu City, Jiangxi, Peoples R China
关键词
high dimensional data mining; big data; intrusion detection;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Under the historical background of big data, the traditional data processing methods can no longer meet the requirement proposed by the intrusion detection of systems. With the current development of information technology, the data in systems become increasingly complex, and the workload of data mining also becomes increasingly large in the intrusion detection of systems, which invisibly increases the difficulty in intrusion detection. In this paper, issues related to the application of high dimensional data mining technology based on big data to intrusion detection are analyzed.
引用
收藏
页码:169 / 171
页数:3
相关论文
共 50 条
  • [1] Intrusion Detection Based on Data Mining
    Oreku, George S.
    Mtenzi, Fredrick J.
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
  • [2] Intrusion detection based on data mining
    Yin, Jian
    Mei, Fang
    Zhang, Gang
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
  • [3] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [4] An intrusion detection model based on data mining over data
    Mao, Yi-Min
    Yang, Lu-Ming
    Chen, Zhi-Gang
    Liu, Li-Xin
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
  • [5] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [6] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [7] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [8] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [9] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [10] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447