Skip to main content
Log in

Association rules applied to intrusion detection

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user’s behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Allen J, Christie A, Fithen W,et al. State of the Practice of Instrusion Detection Technologies. CMU/ SEI-99-TR-028. Carnegie Mellon Software Engineering Institute. http://www.cert.org/archive/pdf/ 99tr028.pdf,2001-12-19.

  2. Agrawal R, Imielinski T, Swami A. Mining Association Rules Between Sets of Items in Large Databases.Proceedings of the ACM SIGMOD Conference on Management of Data. http://www. cs. brandeis. edu/∼cs227b/papers/decision-dataminingoverview-sigmod93.pdf.1998-09.

  3. Savasere A, Omiecinski E, Navathe S. An Efficient Algorithm for Mining Association Rules in Large Databases.Proceedings of the 21 st International Conference on Very large Database. http://www. cs.sfu. ca/CC/884/wangk/references/son95. pdf, 1995-01-06.

  4. Cohen E M. Datar E, Fujiwara S,et al. Finding Interesting Associations without Support Pruning.Proc of the 16th Int’l Conf on Data Engineering (ICDE). IEEE, 2001,13(1):64–78.

    Google Scholar 

  5. Information Discovery Inc.OLAP and Data Mining, Bridging the Gap. http://www.it.iitb.ernet.in/∼ sunita/papers/dmkd01.ps, 1998-01-26.

  6. Bridges S M, Vaughn R B.Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. Mississippi State University: Department of Computer Science, 2000.

  7. Orchard R.FuzzyCLIPS version 6. 04 User’s Guide. National Research Council Canada: Knowledge System Laboratory. http://www.cs.strath.ac.uk/ ∼fabioc/01-ai/docs/fuzzyclips-usrguide.pdf,2001-01-25.

Download references

Author information

Authors and Affiliations

Authors

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (69983005)

Biography: Mao Ping-ping (1979-), male, Master candidate, research direction: multimedia and network security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ping-ping, M., Qiu-ping, Z. Association rules applied to intrusion detection. Wuhan Univ. J. Nat. Sci. 7, 426–430 (2002). https://doi.org/10.1007/BF02828242

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828242

Key words

CLC number

Navigation