Design of Intrusion Detection Model Based on Data Mining Technology

  title={Design of Intrusion Detection Model Based on Data Mining Technology},
  author={Li Yin-huan},
  journal={2012 International Conference on Industrial Control and Electronics Engineering},
  • Li Yin-huan
  • Published 2012 in
    2012 International Conference on Industrial…
This paper focuses on an improved FP-Growth algorithm. Preprocessing of data mining can increase efficiency on searching the common prefix of node and reduce the time complexity of building FP-tree. Based on the improved FP-Growth algorithm and other data mining techniques, an intrusion detection model is carried out. The experimental results demonstrate effectiveness of the improved algorithm and feasibility of intrusion detection model. 

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.
Showing 1-10 of 19 references

Heng-tai, etc. Research on intrusion detection techniques: a survey

  • QING Si-han, MA JIANG Jian-chun
  • 2004
Highly Influential
8 Excerpts

Research overview of intrusion detection algorithms based on association rules. Computer Engineering and Design,Vol.32.No.3

  • WU Yu-gang, QIN Yong, SONG Ji-guang
  • 2011
1 Excerpt

Hua-shen,JIA Lei.Research of intrusion detection system dataset-KDD CUP99

  • ZHANG Xin-you, ZENG
  • Computer Engineering and Design,
  • 2010
1 Excerpt

Improved algorithm based on FP— Growth

  • YANG Yun, LU0 Yan-xia
  • Computer Engineering and Design,
  • 2010
1 Excerpt

Recognition of Attacks Strategy Base on FP-Growth Algorithm and Compensatory Intended Evidence

  • BAI Hao, WANG Kun-sheng, HU Chang-zhen
  • Beijing University of Technology Vol.30.No.8,
  • 2010
1 Excerpt

Hui-fei. FP-Growth Parallel Algorithm in Cluster System.Computer Engineering, Vol.35.No.20,2009

  • LI CHEN Min
  • 2009
1 Excerpt

Application of K-means Clustering Algorithm in Intrusion Detection

  • LI Yang
  • Computer Engineering, Vol.33No
  • 2007
2 Excerpts

The Application Of Data Mining In IDS.Microcomputer Information

  • Huang Shuiyuan, Zhou Lifeng, Duan Longzhen
  • Vol 22,pp.35-38,
  • 2006
1 Excerpt

Similar Papers

Loading similar papers…