Effective mining on large databases for intrusion detection
Data mining is a common automated way of generating normal patterns for intrusion detection systems. In this work a large dataset is customized to be suitable for both sequence mining and association rule learning. These two different mining methods are then tested and compared to find out which one...
| Main Authors: | Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/39403/ http://psasir.upm.edu.my/id/eprint/39403/1/Effective%20mining%20on%20large%20databases%20for%20intrusion%20detection.pdf |
Similar Items
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014)
by: Adinehnia, Reza, et al.
Published: (2014)
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006)
by: Affendey, Lilly Suriani
Published: (2006)
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Energy-efficient intrusion detection in wireless sensor network
by: Salehian, Solmaz, et al.
Published: (2012)
by: Salehian, Solmaz, et al.
Published: (2012)
An efficient schema transformation technique for data migration from relational to column-oriented databases
by: Zaidi, Norwini, et al.
Published: (2022)
by: Zaidi, Norwini, et al.
Published: (2022)
Mining association rule from large databases.
by: Defit, Sarjon, et al.
Published: (2001)
by: Defit, Sarjon, et al.
Published: (2001)
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
by: Udzir, Nur Izura, et al.
Published: (2019)
by: Udzir, Nur Izura, et al.
Published: (2019)
KM-NEU: an efficient hybrid approach for intrusion detection system
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
by: Lisehroodi, Mazyar Mohammadi, et al.
Published: (2014)
Hybrid query for video database system
by: Affendey, Lilly Suriani, et al.
Published: (2008)
by: Affendey, Lilly Suriani, et al.
Published: (2008)
A cloud-based intrusion detection service framework.
by: Yassin, Warusia, et al.
Published: (2012)
by: Yassin, Warusia, et al.
Published: (2012)
Content-based image retrieval using transfer learning and vector database
by: Shuo, Li, et al.
Published: (2022)
by: Shuo, Li, et al.
Published: (2022)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
Intrusion detection based on k-means clustering and OneR classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Intrusion detection based on K-means clustering and Naïve Bayes classification
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
A Review on feature selection and ensemble techniques for intrusion detection system
by: Torabi, Majid, et al.
Published: (2021)
by: Torabi, Majid, et al.
Published: (2021)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A K-Means and Naive Bayes learning approach for better intrusion detection
by: Muda, Zaiton, et al.
Published: (2011)
by: Muda, Zaiton, et al.
Published: (2011)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
A novel approach for handling missing data to enhance network intrusion detection system
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
by: Mohamed Yassin, Warusia, et al.
Published: (2013)
Video concept detection using Hadoop MapReduce framework
by: Affendey, Lilly Suriani, et al.
Published: (2014)
by: Affendey, Lilly Suriani, et al.
Published: (2014)
Intrusion detection system with data mining approach: a review
by: Khalilian, Majdid, et al.
Published: (2011)
by: Khalilian, Majdid, et al.
Published: (2011)
3-L model: a model for checking the integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A framework for caching relevant data divisions for checking integrity constraints of mobile databases
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
A framework for caching relevant data items for checking integrity constraints of mobile database
by: Dzolkhifli, Zarina, et al.
Published: (2008)
by: Dzolkhifli, Zarina, et al.
Published: (2008)
Intelligent mining multi dimensional association rules from large inconsistent databases.
by: Defit, Sarjon, et al.
Published: (2003)
by: Defit, Sarjon, et al.
Published: (2003)
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)
A framework for improving integrity constraints checking of mobile databases by caching relevant data items.
by: Ibrahim, Hamidah, et al.
Published: (2009)
by: Ibrahim, Hamidah, et al.
Published: (2009)
SVM-based approach for detecting misleading online news articles
by: Che Eembi @ Jamil, Normala, et al.
Published: (2019)
by: Che Eembi @ Jamil, Normala, et al.
Published: (2019)
A study on detecting misleading online news using bigram and cosine similarity
by: Ishak, Iskandar, et al.
Published: (2018)
by: Ishak, Iskandar, et al.
Published: (2018)
Techniques for improving clustering and association rules mining from very large transactional databases
by: Li, Yanrong
Published: (2009)
by: Li, Yanrong
Published: (2009)
Data visualization for agricultural data: benefits and challenges
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Towards a headline-based deception detection approach for data veracity in online digital news
by: Eembi @ Jamil, Normala Che, et al.
Published: (2017)
by: Eembi @ Jamil, Normala Che, et al.
Published: (2017)
Fakeheader: a tool to detect deceptive online news based on misleading news headlines and contents
by: Che Eembi @ Jamil, Normala, et al.
Published: (2021)
by: Che Eembi @ Jamil, Normala, et al.
Published: (2021)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression
by: Mehdi, Osama A., et al.
Published: (2018)
by: Mehdi, Osama A., et al.
Published: (2018)
Using feature selection as accuracy benchmarking in clinical data mining.
by: Hossain, Jafreen, et al.
Published: (2013)
by: Hossain, Jafreen, et al.
Published: (2013)
Similar Items
-
User-independent and self-optimizing intrusion detection framework for large database systems
by: Adinehnia, Reza, et al.
Published: (2014) -
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012) -
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013) -
Data Modeling and Hybrid Query for Video Database
by: Affendey, Lilly Suriani
Published: (2006) -
A naturally inspired statistical intrusion detection model
by: Mahboubian, Mohammad, et al.
Published: (2013)