Intrusion detection based on data mining

George S. Oreku, Fredrick J. Mtenzi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

In this article we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques to discover consistent and useful patterns of system features that describe program and user behavior, and use the set of relevant system features to compute (inductively learned) classifiers that can recognize anomalies and known intrusions. The paper also discusses the current level of computer security development in Tanzania with particular interest in IDS application with the fact that approach is easy to implement with less complexity to computer systems architecture, less dependence on operating environment (as compared with other security-based systems) and ability to detect abuse of user privileges easily. The findings are geared towards developing security infrastructure and providing ICT services.

Original languageEnglish
Title of host publication8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009
Pages696-701
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009 - Chengdu, China
Duration: 12 Dec 200914 Dec 2009

Publication series

Name8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009

Conference

Conference8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009
Country/TerritoryChina
CityChengdu
Period12/12/0914/12/09

Keywords

  • Computer security
  • Data mining
  • ICT
  • Intusion detection
  • Security

Fingerprint

Dive into the research topics of 'Intrusion detection based on data mining'. Together they form a unique fingerprint.

Cite this