Abstract
This thesis compares the availability of clustering algorithm and Apriori algorithm in the intrusion detection system. Experiments prove that the clustering algorithm bears better results on Probing and DOS than Apriori algorithm. When detecting intrusion, both algorithms suffer a high rate of missing report, especially when detecting U2R and R2L.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kumar, S., Spafford, E.: An Application of Pattern Matching in Intrusion Detection, Department of computer Science Purdue University, CSD-TR-94-103, Coast TR 94-07 (1994)
Shong, S.: Application of Data Mining in Misuse NIDS. Computer Engineering 30(16), 126–127 (2004) (in Chinese)
Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: Proc. of the 20th Int’l. Conference on Very Large Databases, Santiago, Chile (September 1994)
Xu, X.: Research On Intrusion Detection System Based On Data Mining. Computer Software 12, 27–29 (2008) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Wang, M., Zhao, A. (2012). Investigations of Intrusion Detection Based on Data Mining. In: Qian, Z., Cao, L., Su, W., Wang, T., Yang, H. (eds) Recent Advances in Computer Science and Information Engineering. Lecture Notes in Electrical Engineering, vol 124. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25781-0_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-25781-0_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25780-3
Online ISBN: 978-3-642-25781-0
eBook Packages: EngineeringEngineering (R0)