首页> 外文期刊>International Journal of Applied Engineering Research >Mining Association Rules for Constructing Network Intrusion Detection Model
【24h】

Mining Association Rules for Constructing Network Intrusion Detection Model

机译:挖掘关联规则构建网络入侵检测模型

获取原文
获取原文并翻译 | 示例
           

摘要

Association rules are one of the most researched areas of data mining and have recently received much attention from the database community. In this paper, associations of the form A→B can be interpreted as "if an object has the set A of attributes then it will often/always have those of B as well". In this paper, concentration will be on those methods that depend on the Apriori algorithm, to find such associations in the data that satisfy the user specified minimum support and minimum confidence constraints. To find rules that involve both frequent and rare items, mininmum support has to be set very low. This may cause combinatorial explosion, because those frequent items will be associated with one another in all possible ways. In order to solve this problem, a novel technique MS-Apriori that allows the user to specify multiple minimum supports to reflect the nature of the items and their frequencies in the database are proposed. Finally, to find the detection of associations of mistakes, several interesting measures such as Chi -Square, R -Interestingness Measures, lift, correlation, conviction rate, and cosine were investigated. Since for the test purposes no standard datasets such as KDD Cup was used, it is hard to evaluate and compare their results. However, in this proposed rule based approach, Experimental results on a KDD cup '99 dataset are provided to show the effectiveness of the proposed model for detecting network intrusion.
机译:关联规则是数据挖掘研究最多的领域之一,最近已引起数据库社区的广泛关注。在本文中,形式为A→B的关联可以解释为“如果一个对象具有属性A的集合,那么它也经常/总是也具有B的属性”。在本文中,将集中研究那些依赖于Apriori算法的方法,以在满足用户指定的最小支持和最小置信度约束的数据中找到这种关联。为了找到涉及频繁和稀有物品的规则,最小支持必须设置得非常低。这可能会导致组合爆炸,因为那些频繁出现的项目将以所有可能的方式相互关联。为了解决该问题,提出了一种新技术MS-Apriori,其允许用户指定多个最小支持以反映项目的性质及其在数据库中的频率。最后,为了发现错误的关联,研究了一些有趣的度量,例如卡方,R有趣度度量,提升,相关性,定罪率和余弦。由于出于测试目的,没有使用诸如KDD Cup之类的标准数据集,因此很难评估和比较其结果。但是,在这种基于规则的提议方法中,提供了在KDD cup '99数据集上的实验结果,以显示提出的模型对于检测网络入侵的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号