Anomaly detection scheme using data mining in mobile environment

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

For detecting the intrusion effectively, many researches have developed data mining framework for constructing intrusion detection modules. Traditional anomaly detection techniques focus on detecting anomalies in new data after training on normal data. To detect anomalous behavior, precise normal pattern is necessary. For this, the understanding of the characteristics of data on network is inevitable. In this paper we propose to use clustering and association rules as the basis for guiding anomaly detection in mobile environment. We present dynamic transaction for generating more effectively detection patterns. For applying entropy to filter noisy data, we present a technique for detecting anomalies without training on normal data. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Park, K. J., & Ryou, H. B. (2003). Anomaly detection scheme using data mining in mobile environment. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2668, 21–30. https://doi.org/10.1007/3-540-44843-8_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free