Data Mining Algorithm

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 67485 Experts worldwide ranked by ideXlab platform

Ming Xue - One of the best experts on this subject based on the ideXlab platform.

  • applied research on Data Mining Algorithm in network intrusion detection
    International Joint Conference on Artificial Intelligence, 2009
    Co-Authors: Ming Xue, Changju Zhu
    Abstract:

    Abstract—Intrusion Detection is one of network security area of technology main research directions. Data Mining technology will be applied to Network Intrusion Detection System (NIDS), may automatically discover the new pattern from the massive network Data, to reduce the workload of the manual compilation intrusion behavior patterns and normal behavior patterns. This article reviewed the current intrusion detection technology and the Data Mining technology briefly.Focus on Data Mining Algorithm in anomaly detection and misuse detection of specific applications. For misuse detection,the main study the classification Algorithm; For anomaly detection, the main study the pattern comparison and the cluster Algorithm. In pattern comparison to analysis deeply the association rules and sequence rules . Finally, has analysised the difficulties which the current Data Mining Algorithm in intrusion detection applications faced at present , and has indicated the next research direction.

  • JCAI - Applied Research on Data Mining Algorithm in Network Intrusion Detection
    2009 International Joint Conference on Artificial Intelligence, 2009
    Co-Authors: Ming Xue, Changjun Zhu
    Abstract:

    Abstract—Intrusion Detection is one of network security area of technology main research directions. Data Mining technology will be applied to Network Intrusion Detection System (NIDS), may automatically discover the new pattern from the massive network Data, to reduce the workload of the manual compilation intrusion behavior patterns and normal behavior patterns. This article reviewed the current intrusion detection technology and the Data Mining technology briefly.Focus on Data Mining Algorithm in anomaly detection and misuse detection of specific applications. For misuse detection,the main study the classification Algorithm; For anomaly detection, the main study the pattern comparison and the cluster Algorithm. In pattern comparison to analysis deeply the association rules and sequence rules . Finally, has analysised the difficulties which the current Data Mining Algorithm in intrusion detection applications faced at present , and has indicated the next research direction.

Changju Zhu - One of the best experts on this subject based on the ideXlab platform.

  • applied research on Data Mining Algorithm in network intrusion detection
    International Joint Conference on Artificial Intelligence, 2009
    Co-Authors: Ming Xue, Changju Zhu
    Abstract:

    Abstract—Intrusion Detection is one of network security area of technology main research directions. Data Mining technology will be applied to Network Intrusion Detection System (NIDS), may automatically discover the new pattern from the massive network Data, to reduce the workload of the manual compilation intrusion behavior patterns and normal behavior patterns. This article reviewed the current intrusion detection technology and the Data Mining technology briefly.Focus on Data Mining Algorithm in anomaly detection and misuse detection of specific applications. For misuse detection,the main study the classification Algorithm; For anomaly detection, the main study the pattern comparison and the cluster Algorithm. In pattern comparison to analysis deeply the association rules and sequence rules . Finally, has analysised the difficulties which the current Data Mining Algorithm in intrusion detection applications faced at present , and has indicated the next research direction.

Changjun Zhu - One of the best experts on this subject based on the ideXlab platform.

  • JCAI - Applied Research on Data Mining Algorithm in Network Intrusion Detection
    2009 International Joint Conference on Artificial Intelligence, 2009
    Co-Authors: Ming Xue, Changjun Zhu
    Abstract:

    Abstract—Intrusion Detection is one of network security area of technology main research directions. Data Mining technology will be applied to Network Intrusion Detection System (NIDS), may automatically discover the new pattern from the massive network Data, to reduce the workload of the manual compilation intrusion behavior patterns and normal behavior patterns. This article reviewed the current intrusion detection technology and the Data Mining technology briefly.Focus on Data Mining Algorithm in anomaly detection and misuse detection of specific applications. For misuse detection,the main study the classification Algorithm; For anomaly detection, the main study the pattern comparison and the cluster Algorithm. In pattern comparison to analysis deeply the association rules and sequence rules . Finally, has analysised the difficulties which the current Data Mining Algorithm in intrusion detection applications faced at present , and has indicated the next research direction.

Masato Takeichi - One of the best experts on this subject based on the ideXlab platform.

  • calculating a new Data Mining Algorithm for market basket analysis
    Practical Aspects of Declarative Languages, 2000
    Co-Authors: Zhenjiang Hu, Weingan Chin, Masato Takeichi
    Abstract:

    The general goal of Data Mining is to extract interesting correlated information from large collection of Data. A key computationally-intensive subproblem of Data Mining involves finding frequent sets in order to help mine association rules for market basket analysis. Given a bag of sets and a probability, the frequent set problem is to determine which subsets occur in the bag with some minimum probability. This paper provides a convincing application of program calculation in the derivation of a completely new and fast Algorithm for this practical problem. Beginning with a simple but inefficient specification expressed in a functional language, the new Algorithm is calculated in a systematic manner from the specification by applying a sequence of known calculation techniques.

Chen Yu-xiao - One of the best experts on this subject based on the ideXlab platform.