Abstract

Intrusion detection technology is a research hotspot in the field of information security. This study introduces the types of traditional intrusion detection and data mining technology; Aiming at the defects and limitations of current intrusion detection system, the study has fused the data mining technology into intrusion detection model, and has designed and implemented the intrusion detection system based on data mining technology with the preliminary research and exploration.

Highlights

  • With the rapid development of the internet, the various attacks, which emerge endlessly in the network, have become a major threat to network and information security

  • This study makes a preliminary in this field of research and exploration and implements intrusion detection model system based on data mining technology (Lu et al, 2003)

  • High efficiency detection: facing to mass data flow in the current network environment, the data should be detected by intrusion detection system, which has to be processed after pretreatment

Read more

Summary

INTRODUCTION

With the rapid development of the internet, the various attacks, which emerge endlessly in the network, have become a major threat to network and information security. For existing complex attack behaviors in the network, it is an important study issue how to establish an effective intrusion detection model (Su and Fu, 2007) by network security experts. This study makes a preliminary in this field of research and exploration and implements intrusion detection model system based on data mining technology (Lu et al, 2003). The rules which are designed for the specific system environment and detection method are provided by security experts through the manual coding. It makes system inefficient and limits the ability of scalability and self-adaption of the system.

Result expression and interpretation
EXPERIMENTS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.