【24h】

Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems

机译:模糊数据挖掘方法在入侵检测系统中的应用

获取原文
获取原文并翻译 | 示例

摘要

Two data mining methods (association rule mining and frequent episode mining) have been proved to fit to the intrusion detection problem. But the normal and the intrusions in computer networks are hard to predict as the boundaries between them cannot be well defined. This prediction process may generate false alarms in many anomaly based intrusion detection systems. This paper presented a method to realize that the false alarm rate in determining intrusive activities can be reduced with fuzzy logic. A set of fuzzy rules can be used to define the normal and abnormal behavior in a computer network, and fuzzy data mining algorithms can be applied over such rules to determine when an intrusion is in progress. In this paper, we have introduced modifications of these methods that mine fuzzy association rules and fuzzy frequent episodes and have described off-line methods that utilize these fuzzy methods for anomaly detection from audit data. We describe experiments that explore their applicability for intrusion detection. Experimental results indicate that fuzzy data mining can provide effective approximate anomaly detection.
机译:两种数据挖掘方法(关联规则挖掘和频繁事件挖掘)已被证明适合入侵检测问题。但是,由于无法很好地定义计算机网络之间的界限,因此很难预测计算机网络的正常情况和入侵情况。在许多基于异常的入侵检测系统中,此预测过程可能会生成错误警报。提出了一种利用模糊逻辑可以降低确定介入活动误报率的方法。可以使用一组模糊规则来定义计算机网络中的正常行为和异常行为,并且可以将模糊数据挖掘算法应用于此类规则来确定何时进行入侵。在本文中,我们介绍了对这些方法的修改,这些方法挖掘了模糊关联规则和模糊频繁事件,并描述了利用这些模糊方法从审计数据中进行异常检测的脱机方法。我们描述了探索其适用于入侵检测的实验。实验结果表明,模糊数据挖掘可以提供有效的近似异常检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号