The Application of High Dimensional Data Mining Based on Big Data to Intrusion Detection

被引:0
|
作者
Liu, Jinhua [1 ]
机构
[1] Xinyu Univ, Modern Educ Technol Ctr, Xinyu City, Jiangxi, Peoples R China
关键词
high dimensional data mining; big data; intrusion detection;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Under the historical background of big data, the traditional data processing methods can no longer meet the requirement proposed by the intrusion detection of systems. With the current development of information technology, the data in systems become increasingly complex, and the workload of data mining also becomes increasingly large in the intrusion detection of systems, which invisibly increases the difficulty in intrusion detection. In this paper, issues related to the application of high dimensional data mining technology based on big data to intrusion detection are analyzed.
引用
收藏
页码:169 / 171
页数:3
相关论文
共 50 条
  • [21] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [22] A fuzzy data mining based intrusion detection model
    Jin, H
    Sun, JH
    Chen, H
    Han, ZF
    10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 191 - 197
  • [23] A DDOS Intrusion Detection Method Based On Data Mining
    Tian Jun-feng
    Pang Tao
    Du Rui-zhong
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 42 - 46
  • [24] An efficient framework for intrusion detection based on data mining
    Li, Weidong
    Zhang, Kejun
    Li, Boqun
    Yang, Bingru
    2005 ICSC CONGRESS ON COMPUTATIONAL INTELLIGENCE METHODS AND APPLICATIONS (CIMA 2005), 2005, : 55 - 58
  • [25] The Analysis of Application of Data Mining Technology in the System of Intrusion Detection
    Liu, Zhijun
    Pu, Xiaowei
    PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 28, 2014, 28 : 75 - 78
  • [26] Application Research on Data Mining Algorithm in Intrusion Detection System
    Wu, Weizu
    Liu, Liqun
    Xu, Bing
    3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 607 - 612
  • [27] Towards data fusion-based big data analytics for intrusion detection
    Jemili, Farah
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2023, 7 (04) : 409 - 436
  • [28] Data Mining and Intrusion Detection Systems
    Dewa, Zibusiso
    Maglaras, Leandros A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 62 - 71
  • [29] Data mining approaches for intrusion detection
    Lee, W
    Stolfo, SJ
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93
  • [30] Intrusion detection using data mining
    Puthran, Shubha
    Shah, Ketan
    Puthran, Shubha (shubha.puthran@nmims.edu), 1600, Inderscience Publishers (09): : 292 - 306