Data mining approaches for intrusion detection

作者: Wenke Lee , Salvatore J. Stolfo

DOI: 10.21236/ADA401496

关键词: Artificial intelligenceComputer scienceData miningKey (cryptography)Anomaly-based intrusion detection systemMachine learningSystem callPattern recognition (psychology)Feature selectionConstruct (python library)Association rule learningIntrusion detection system

摘要: … of building an intrusion detection system. We take a data-centric point of view and consider intrusion detection as a data analysis process. Anomaly detection is about finding the normal …

参考文章(21)
Alfonso Valdes, Phillip A. Porras, Live Traffic Analysis of TCP/IP Gateways. network and distributed system security symposium. ,(1998)
Heikki Mannila, A. Inkeri Verkamo, Hannu Toivonen, Discovering Frequent Episodes in Sequences. knowledge discovery and data mining. pp. 210- 215 ,(1995)
Salvatore J. Stolfo, Philip K. Chan, Toward parallel and distributed learning by meta-learning AAAIWS'93 Proceedings of the 2nd International Conference on Knowledge Discovery in Databases. pp. 227- 240 ,(1993)
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Ramakrishnan Srikant, Rakesh Agrawal, Mining Generalized Association Rules very large data bases. pp. 407- 419 ,(1995)
Ramakrishnan Srikant, Jeffrey F. Naughton, Fast algorithms for mining association rules and sequential patterns The University of Wisconsin - Madison. ,(1996)
Jeffrey Kephart, Gregory Sorkin, Morton Swimmer, Steve White, Blueprint for a Computer Immune System Proceedings of the 1997 International Virus Bulletin Conference, San Francisco, California, October, 1997. pp. 242- 261 ,(1999) , 10.1007/978-3-642-59901-9_13
Eugene H. Spafford, Sandeep Kumar, A Software Architecture to Support Misuse Intrusion Detection ,(1995)