Fourth International Conference on Machine Learning and Applications (ICMLA'05)
DOI: 10.1109/icmla.2005.17
|View full text |Cite
|
Sign up to set email alerts
|

Creation and Deployment of Data Mining-Based Intrusion Detection Systems

Abstract: Network security technology has become crucial in protecting government and industry computing infrastructure.Modern intrusion detection applications face complex requirements -they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in the design and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…In both techniques, Data Mining (DM) is used to reduce human effort and increase detection accuracy [22]. In recent years, DMbased IDS for databases have been developed [5,6,10,13,16,19,21,26,33,34,44]. Supervising user queries is also a component of IDS.…”
Section: B Reactive Data Security Solutionsmentioning
confidence: 99%
“…In both techniques, Data Mining (DM) is used to reduce human effort and increase detection accuracy [22]. In recent years, DMbased IDS for databases have been developed [5,6,10,13,16,19,21,26,33,34,44]. Supervising user queries is also a component of IDS.…”
Section: B Reactive Data Security Solutionsmentioning
confidence: 99%
“…Abuse identification utilizes pattern of familiar assault or weak areas of the system to detect intrusion [9]. Anomaly detection determines the deviation that is established from normally used patterns and flagged as intrusion [10]. The major challenge in intrusion detection is the identification of the hidden intrusion from a large quantity of typical communication practices [11].…”
Section: Related Workmentioning
confidence: 99%
“…This dataset consists of selected records from the original dataset to overcome those shortcomings. In [10], this paper describes Database-centric Architecture for Intrusion Detection (DAID); a system that leverages data mining within the Oracle RDBMS to address the challenges arise when designing and implementing data mining-based intrusion detection systems. DAID offers numerous advantages in terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability.…”
Section: Related Workmentioning
confidence: 99%