• DocumentCode
    3225197
  • Title

    Intrusion detection system with the data mining technologies

  • Author

    Pu, Wang ; Jun-qing, Wang

  • Author_Institution
    Taiyuan Univ. of Sci. & Technol., Taiyuan, China
  • fYear
    2011
  • fDate
    27-29 May 2011
  • Firstpage
    490
  • Lastpage
    492
  • Abstract
    Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. However, traditional IDs are vulnerable to original and novel malicious attacks. Also, it is very inefficient to analyze from a large amount volume data such as possibility logs. In addition, there are high false positives and false negatives for the common IDSs. Data mining has been popularly recognized as an important way to mine useful information from large volumes of data which is noisy, fuzzy, and random. Thus, how to integrate the data mining techniques into the intrusion detection systems has become a hot topic recently. In this paper, we present the whole techniques of the IDS with data mining approaches in details.
  • Keywords
    Internet; computer network security; data mining; World Wide Web; data mining technologies; defense tool; intrusion detection system; network administrator; network attacks; policy violation detection; Computers; Monitoring; Data Mining; Intrusion Detection; Network Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
  • Conference_Location
    Xi´an
  • Print_ISBN
    978-1-61284-485-5
  • Type

    conf

  • DOI
    10.1109/ICCSN.2011.6013951
  • Filename
    6013951