Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 191))

  • 1430 Accesses

Abstract

With the rapid development of the network, network security has become one of the most important issues, as it directly affects the interests of the state, enterprises and individuals. Further more, with the increasingly mature of the attack knowledge, complex and diverse attack tools and techniques, the current simple firewall technology has been unable to meet the needs of the people. Facing so many challenges and threats, intrusion detection and prevention technology is bound to become one of the core technologies in the security audit. The iintrusion detection, playing a role of active defense, is an effective complement to the firewall, and is an important part of network security. This paper mainly analyzes the decision tree algorithm and improved Naive Bayes algorithm, proving the effectiveness of the improved Naive Bayes algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modelling Intrusion Detection System Using Hybrid Systems. J. Network Comput. Appl. 30, 114–132 (2007)

    Article  Google Scholar 

  2. Xiang, C., Chong, M.Y., Zhu, H.L.: Design of Multiple-level Tree Classifiers for Intrusion Detection System. In: Proc.2004 IEEE Conf. on Cybernetics and Intelligent Systems, Singapore, pp. 872–877 (December 2007)

    Google Scholar 

  3. Xiang, C., Yong, P.C., Meng, L.S.: Design of Multiple-level Hybrid Classifier for Intrusion Detection System Using Bayesian Clustering and Decision Trees. Pattern Recognition Letters 29, 918–924 (2008)

    Article  Google Scholar 

  4. Kumar, S., Spafford, E.H.: Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (2005)

    Google Scholar 

  5. Smaha, S.E.: Haystack: An Intrusion Detection System. In: Proceedings of the IEEE Fourth Aerospace Computer Security Applications Conference, Orlando, FL, pp. 37–44 (2008)

    Google Scholar 

  6. Lee, W.: A Data Mining for Constructing Features and Models for Intrusion Detection System, Ph. D. Dissertation, Columbia University (2009)

    Google Scholar 

  7. Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: Proc. the 7th USENIX Security Symposium, San Antonio, TX (2008)

    Google Scholar 

  8. Pfahringer, B.: Winning the KDD99 Classification Cup: Bagged Boosting. In: SIGKDD Explorations, 2000 ACM SIGKDD, vol. 1(2), pp. 65–66 (January 2000)

    Google Scholar 

  9. Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Bayesian Event Classification for Intrusion Detection. In: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV (2007)

    Google Scholar 

  10. Valdes, A., Skinner, K.: Adaptive Model-based Monitoring for Cyber Attack Detection. In: Recent Advances in Intrusion Detection, Toulouse, France, pp. 80–92 (2008)

    Google Scholar 

  11. Ye, N., Xu, M., Emran, S.M.: Probabilistic Networks with Undirected Links for Anomaly Detection. In: Proceedings of the IEEE Systems, Man and Cybernetics Information Assurance and Security Workshop, West Point, NY (2009)

    Google Scholar 

  12. Portnoy, L., Eskin, E., Stolfo, S.J.: Intrusion Detection with Unlabeled Data Using Clustering. In: Proceedings of the ACM Workshop on Data Mining Applied to Security, Philadelphia, PA (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Yunfeng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yunfeng, Y. (2013). Research on the System Model of Network Intrusion Detection. In: Du, Z. (eds) Proceedings of the 2012 International Conference of Modern Computer Science and Applications. Advances in Intelligent Systems and Computing, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33030-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33030-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33029-2

  • Online ISBN: 978-3-642-33030-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics