Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls.
Guiling ZhangPublished in: ICCNMC (2005)
Keyphrases
- intrusion detection
- fuzzy association rules
- association rules mining
- intrusion detection system
- anomaly detection
- association rules
- mining algorithm
- network security
- fuzzy sets
- network intrusion detection
- rule mining
- network traffic
- sequential patterns
- detecting anomalous
- data mining techniques
- membership functions
- data mining
- interestingness measures
- information security
- fraud detection
- intrusion prevention
- pattern recognition
- apriori algorithm
- mining association rules
- data mining tools
- pattern mining
- attribute values
- association rule mining
- network attacks
- high dimensional