location:Home > 2018 Vol.1 Dec. No.6 > Campus wireless network malicious attack detection technology

2018 Vol.1 Dec. No.6

  • Title: Campus wireless network malicious attack detection technology
  • Name: Egbert George
  • Company: University of Neuchatel
  • Abstract:

    The detection technology for malicious attacks to campus wireless network is analyzed. In this paper, a detection method based on PrefixSpan algorithm for malicious attacks to campus wireless network is adopted. Aiming at hostile attacks environment to the wireless network campus, the detection method is proposed to reduce the amount of computation and memory consumption, and through incremental learning to achieve training of large data, and improve performance of mining further. Experimental results show that the proposed algorithm for hostile attacks detection to campus wireless network, can effectively improve accuracy and security of detection, and achieved the desired results.

  • Keyword: attack detection; data mining; safety
  • DOI: 10.12250/jpciams2018060113
  • Citation form: Egbert George.Campus wireless network malicious attack detection technology[J]. Computer Informatization and Mechanical System, 2018, vol. 1, pp. 22-24.
Reference:

[1]Liu Xiangqi, Chong Xiangting, Zhen Chenggang. Intrusion Detection System Based on Data Mining [J]. Information System Engineering ,2013,04:44-45,50.

[2] Zhao Yanjun, Wei Mingjun. The application of Improved Data Mining Algorithm in Intrusion Detection System [J].Computer Engineering and Applications ,2013,18:69-72,115.

[3] Qi Aihua, Song Shucai. The application of data MiningTechnology inComputer IntrusionDetection[J].Bulletin of Science and Technology ,2013,10:19-20,23.

[4] Cho  S,  Pearlman  W  A.  A  Full-featured,  Error-resilient,  Scalable Wavelet  Video  Codec  Based  on  the  Set  Partitioning  in  Hierarchical Trees (SPIHT) Algorithm. IEEE Trans. on CAS for VT, 2002, 12(3):157-171

[5] Xie QingXiu, Regional Conflict Hot Blind Localization Algorithm Based on Wireless Network[J]. Bulletin of Science and Technology, 2013, 29(12): 97-99.

[6] Mula y S, Devale P ,Gar J G. Decision tree basedsupport vector machine for intrusion detection[C].Procof Networking and Information Technology(ICNIT),Piscataway,NJ:IEEE 2010 59-63.


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16