Proceedings of the 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering

Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach

Authors
Shan Jiang, Changai Chen
Corresponding Author
Shan Jiang
Available Online April 2015.
DOI
10.2991/isrme-15.2015.109How to use a DOI?
Keywords
Network Intrusion Detection; Data Mining; Data Analysis Technique; Network Structure Optimization and Security; Theoretical Background.
Abstract

The security of software applications, from web-based applications to mobile services, is always at risk because of the open society of internet. With the increase in the number of network throughput and security threats, intrusion detection system has attracted much attention in recent years. In this paper, we undertake the research on the principle techniques for network intrusion detection based on data mining and analysis approach. We adopt the prior knowledge on Bayesian network which is a directed acyclic graph, each node represents a random variable and an edge said direct probabilistic dependencies between two connected nodes. Then, we use the traditional risk assessment model to measure the possibility of being hearted. The numeric analysis and experimental illustration indicates the effectiveness of our method compared with other popular adopted state-of-the-art methodologies. In the future, we plan to introduce the graph and complex network theory into our prototype system to enhance the performance.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering
Series
Advances in Intelligent Systems Research
Publication Date
April 2015
ISBN
10.2991/isrme-15.2015.109
ISSN
1951-6851
DOI
10.2991/isrme-15.2015.109How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Shan Jiang
AU  - Changai Chen
PY  - 2015/04
DA  - 2015/04
TI  - Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach
BT  - Proceedings of the 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering
PB  - Atlantis Press
SP  - 513
EP  - 517
SN  - 1951-6851
UR  - https://doi.org/10.2991/isrme-15.2015.109
DO  - 10.2991/isrme-15.2015.109
ID  - Jiang2015/04
ER  -