DocumentCode
2823723
Title
An intrusion detection approach based on data mining
Author
Qing, Ye ; Xiaoping, Wu ; Gaofeng, Huang
Author_Institution
Dept. of Inf. Security, Naval Univ. of Eng., Wuhan, China
Volume
1
fYear
2010
fDate
21-24 May 2010
Abstract
An intrusion is defined as any set of actions that compromise the integrity, confidentiality or availability of a resource. Data mining is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. It is demanding to apply data mining techniques to detect various intrusions. This paper presents an approach to detect intrusion based on data mining frame work. In the framework, intrusion detection is thought of as clustering. The reduction algorithm is presented to cancel the redundant attribute set and obtain the optimal attribute set to form the input of the FCM. To find the reasonable initial centers easily, the advanced FCM is established, which improves the performance of intrusion detection since the traffic is large and the types of attack are various. In the illustrative example, the number of attributes is reduced greatly and the detection is in a high precision for the attacks of DoS and Probe, a low false positive rate in all types of attacks.
Keywords
data mining; pattern clustering; security of data; DoS attack; FCM; Probe; data mining techniques; fuzzy c-means clustering; intrusion detection approach; optimal attribute set; reduction algorithm; redundant attribute set; Availability; Bioinformatics; Clustering algorithms; Computer crime; Computer networks; Data engineering; Data mining; Information security; Intrusion detection; Probes; FCM; data mining; intrusion detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Future Computer and Communication (ICFCC), 2010 2nd International Conference on
Conference_Location
Wuhan
Print_ISBN
978-1-4244-5821-9
Type
conf
DOI
10.1109/ICFCC.2010.5497340
Filename
5497340
Link To Document