模糊关联规则在入侵检测中的应用

Kaixing Wu, Juan Hao, Chunhua Wang
{"title":"模糊关联规则在入侵检测中的应用","authors":"Kaixing Wu, Juan Hao, Chunhua Wang","doi":"10.1109/ICICIS.2011.72","DOIUrl":null,"url":null,"abstract":"Intrusion detection system (IDS) is based on data mining technology in this paper. Association rule mining which is a method of data mining will make the boundaries of intervals hard. It will increase the information loss. In this paper, a novel framework based on data mining techniques is proposed for designing IDS. In this framework, the classification engine, which is actually the core of the IDS, uses fuzzy association rules for building classifiers. Particularly, the fuzzy association rule sets are exploited as descriptive models of different classes. Generally, the proposed approach outperforms other methods, especially in terms of false positive rate.","PeriodicalId":255291,"journal":{"name":"2011 International Conference on Internet Computing and Information Services","volume":"15 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Application of Fuzzy Association Rules in Intrusion Detection\",\"authors\":\"Kaixing Wu, Juan Hao, Chunhua Wang\",\"doi\":\"10.1109/ICICIS.2011.72\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion detection system (IDS) is based on data mining technology in this paper. Association rule mining which is a method of data mining will make the boundaries of intervals hard. It will increase the information loss. In this paper, a novel framework based on data mining techniques is proposed for designing IDS. In this framework, the classification engine, which is actually the core of the IDS, uses fuzzy association rules for building classifiers. Particularly, the fuzzy association rule sets are exploited as descriptive models of different classes. Generally, the proposed approach outperforms other methods, especially in terms of false positive rate.\",\"PeriodicalId\":255291,\"journal\":{\"name\":\"2011 International Conference on Internet Computing and Information Services\",\"volume\":\"15 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Internet Computing and Information Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICIS.2011.72\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Internet Computing and Information Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICIS.2011.72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

本文提出了一种基于数据挖掘技术的入侵检测系统。关联规则挖掘是数据挖掘的一种方法,它使区间的边界难以确定。这会增加信息的丢失。本文提出了一种基于数据挖掘技术的入侵检测系统设计框架。在这个框架中,分类引擎(实际上是IDS的核心)使用模糊关联规则来构建分类器。特别地,模糊关联规则集被用作不同类别的描述模型。总体而言,该方法优于其他方法,特别是在误报率方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Application of Fuzzy Association Rules in Intrusion Detection
Intrusion detection system (IDS) is based on data mining technology in this paper. Association rule mining which is a method of data mining will make the boundaries of intervals hard. It will increase the information loss. In this paper, a novel framework based on data mining techniques is proposed for designing IDS. In this framework, the classification engine, which is actually the core of the IDS, uses fuzzy association rules for building classifiers. Particularly, the fuzzy association rule sets are exploited as descriptive models of different classes. Generally, the proposed approach outperforms other methods, especially in terms of false positive rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信