Survey of Intrusion Detection Methods Based on Data Mining Algorithms

2019 
With the development of data mining learning algorithms, such as One-class SVM, Fuzzy Clustering, K-means, Apriori and so on, they are more and more widely used in the field of security log analysis. For example, the combination of time series algorithm and association algorithm can be used to mine frequent item sets in transaction databases, and then generate association rules to discover the intrinsic relationship of security logs and find out the potential attack patterns of hackers. The combination of dimensionality reduction algorithm and clustering algorithm can speed up the distinction between normal log data and abnormal log data, and improve the efficiency. This paper discusses the latest security log analysis methods based on different data mining algorithms at home and abroad, lists the contribution and role of each research method for security analysis, and compares the advantages and disadvantages of the combination of different data mining algorithms for security analysis. According to the current demand of network security research, this paper puts forward the improvement direction of combining data mining algorithm with security log in the future.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    35
    References
    5
    Citations
    NaN
    KQI
    []