DocumentCode
255158
Title
Data mining based on intrusion detection system and attack ontologiess
Author
Banaei, S. ; Javanmard, M.
Author_Institution
PNU, Tehran, Iran
fYear
2014
fDate
27-29 May 2014
Firstpage
32
Lastpage
32
Abstract
Nowadays, by spreading the usage of the Internet, having a secure communication channels for providing a safe network, is needed. Firewalls are not sufficient enough to prevent attacks among computer networks, because internal attacks are incontrollable. For prevention of these internal attacks, unauthorized intrusion detection systems will be used to secure the network. In this paper, firstly, we define data mining methods, and then we look through various attacks and intrusion detections, and base on these matters, we discuss a data mining-based method for network intrusion detection and attack ontologies.
Keywords
authorisation; computer crime; computer network security; data mining; ontologies (artificial intelligence); Internet usage; attack ontologies; attacks prevention; computer networks; data mining methods; internal attacks; network intrusion detection; network security; safe network; secure communication channels; unauthorized intrusion detection systems; Ontologies; Attacks; Computer Networks; Data Mining; Intrusion Detection; Ontology; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information and Knowledge Technology (IKT), 2014 6th Conference on
Conference_Location
Shahrood
Print_ISBN
978-1-4799-5658-6
Type
conf
DOI
10.1109/IKT.2014.7030328
Filename
7030328
Link To Document