DocumentCode :
3225197
Title :
Intrusion detection system with the data mining technologies
Author :
Pu, Wang ; Jun-qing, Wang
Author_Institution :
Taiyuan Univ. of Sci. & Technol., Taiyuan, China
fYear :
2011
fDate :
27-29 May 2011
Firstpage :
490
Lastpage :
492
Abstract :
Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. However, traditional IDs are vulnerable to original and novel malicious attacks. Also, it is very inefficient to analyze from a large amount volume data such as possibility logs. In addition, there are high false positives and false negatives for the common IDSs. Data mining has been popularly recognized as an important way to mine useful information from large volumes of data which is noisy, fuzzy, and random. Thus, how to integrate the data mining techniques into the intrusion detection systems has become a hot topic recently. In this paper, we present the whole techniques of the IDS with data mining approaches in details.
Keywords :
Internet; computer network security; data mining; World Wide Web; data mining technologies; defense tool; intrusion detection system; network administrator; network attacks; policy violation detection; Computers; Monitoring; Data Mining; Intrusion Detection; Network Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-61284-485-5
Type :
conf
DOI :
10.1109/ICCSN.2011.6013951
Filename :
6013951
Link To Document :
بازگشت