DocumentCode
3225197
Title
Intrusion detection system with the data mining technologies
Author
Pu, Wang ; Jun-qing, Wang
Author_Institution
Taiyuan Univ. of Sci. & Technol., Taiyuan, China
fYear
2011
fDate
27-29 May 2011
Firstpage
490
Lastpage
492
Abstract
Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. However, traditional IDs are vulnerable to original and novel malicious attacks. Also, it is very inefficient to analyze from a large amount volume data such as possibility logs. In addition, there are high false positives and false negatives for the common IDSs. Data mining has been popularly recognized as an important way to mine useful information from large volumes of data which is noisy, fuzzy, and random. Thus, how to integrate the data mining techniques into the intrusion detection systems has become a hot topic recently. In this paper, we present the whole techniques of the IDS with data mining approaches in details.
Keywords
Internet; computer network security; data mining; World Wide Web; data mining technologies; defense tool; intrusion detection system; network administrator; network attacks; policy violation detection; Computers; Monitoring; Data Mining; Intrusion Detection; Network Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location
Xi´an
Print_ISBN
978-1-61284-485-5
Type
conf
DOI
10.1109/ICCSN.2011.6013951
Filename
6013951
Link To Document