吉林大学学报(工学版)

• • Previous Articles     Next Articles

Network intrusion detection system based on sequential patterns

Li Chuan-chuan,Liu Yan-heng,Tian Da-xin   

  1. College of Computer Science and Technology,Jilin University,Changchun 130012,China
  • Received:2006-03-16 Revised:2006-08-20 Online:2007-01-01 Published:2007-01-01
  • Contact: Liu Yan-heng

Abstract: The paper applies data mining technology to network intrusion detection system(NIDS) according to the characteristics of NIDS. The design principles and the implementation of the NIDS are illustrated. The main attribute and interest measure are introduced to improve the (GSP) algorithm, which is then applied in the data mining module of the system. The results of experiments show that the precision and performance of the NIDS are improved by the optimized algorithm.

Key words: compuer systems organization, intrusion detection, data mining, sequential pastern, axis attributes, interest measure

CLC Number: 

  • TP309
[1] DENG Jian-xun, XIONG Zhong-yang, DENG Xin. Improved DNALA algorithm based on spectral clustering matrix [J]. 吉林大学学报(工学版), 2018, 48(3): 903-908.
[2] REN Wei-wu, HU Liang, ZHAO Kuo. Intrusion alert correlation model based on data mining and ontology [J]. 吉林大学学报(工学版), 2015, 45(3): 899-906.
[3] WANG Liang, HU Kun-yuan, KU Tao, WU Jun-wei. Discovering spatiotemporal hot spot region and mining patterns fro moving trajectory random sampling [J]. 吉林大学学报(工学版), 2015, 45(3): 913-920.
[4] LUO Zhi-yong,YOU Bo,XU Jia-zhong,LIANG Yong. Automatic recognition model of intrusive intention based on three layers attack graph [J]. 吉林大学学报(工学版), 2014, 44(5): 1392-1397.
[5] LIU Shu-fen, MENG Dong-xue, WANG Xiao-yan. DBSCAN algorithm based on grid cell [J]. 吉林大学学报(工学版), 2014, 44(4): 1135-1139.
[6] LIU Zhao-jun, ZHAO Hao-yu, WANG Jing, LI Xiong-fei, LI Wei. Clustering XML documents by layer information [J]. 吉林大学学报(工学版), 2014, 44(01): 124-128.
[7] BAI Tian, JI Jin-chao, HE Jia-liang, ZHOU Chun-guang. New clustering method of mixed-attribute data [J]. 吉林大学学报(工学版), 2013, 43(01): 130-134.
[8] LIU Da-you, YANG Jian-ning, YANG Bo, ZHAO Xue-hua, Jin Di. Community mining from complex networks based on loop tightness [J]. 吉林大学学报(工学版), 2013, 43(01): 98-105.
[9] ZHANG Jun-wei, YANG Jing, ZHANG Jian-pei, ZHANG Le-jun. Sensitive association rule hiding based on sliding window [J]. 吉林大学学报(工学版), 2013, 43(01): 172-178.
[10] WANG Jian-lin, YANG Yin-sheng, WANG Xue-ling. Evaluation of land use in Yellow river delta based on extension data mining [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 479-483.
[11] PAN Wei-tao, XIE Yuan-bin, HAO Yue, SHI Jiang-yi. Frequent subcircuits extraction algorithm based on heuristic chain search [J]. 吉林大学学报(工学版), 2011, 41(6): 1748-1753.
[12] NI Ping,LIAO Jian-xin,ZHU Xiao-min,WAN Li,. Incremental multi-dimension scaling visualization mining method for data stream [J]. 吉林大学学报(工学版), 2011, 41(03): 817-821.
[13] MA Xin,LIANG Yan-chun,TIAN Ye,YU Tao. An immune and contract net protocol-based multi-agent intrusion detection system [J]. 吉林大学学报(工学版), 2011, 41(01): 176-0181.
[14] TIAN Ye, LIU Da-You. Improved clustering algorithm in peertopeer environments [J]. 吉林大学学报(工学版), 2010, 40(06): 1639-1643.
[15] WU Jing,LIU Yan-heng,Lü Rong. Distribute learning algorithm based on fuzzy C-means [J]. 吉林大学学报(工学版), 2010, 40(01): 171-0175.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!