Acknowledgement
This work was supported by the Gachon University research fund of 2021 (GCU-202104500001).
References
- A.S.Sadh and N.Shukla, "Association Rules Optimization: A Survey," Int. J. of Advanced Comput. Res., Vol.3, No.1, pp.111-115, 2013. https://doi.org/10.1002/adom.201370013
- G.J.Simon, P.J.Caraballo, T.M.Therneau, S.S.Cha, M.R.Castro, and P.W.Li, "Extending Association Rule Summarization Techniques to Assess Risk of Diabetes Mellitus," IEEE Trans. Knowl. Data Eng., Vol.27, No.1, pp.130-141, 2015. https://doi.org/10.1109/TKDE.2013.76
- I.F.Videla-Cavieres and S.A.Rios, "Extending market basket analysis with graph mining techniques: A real case," Expert Syst. Appl., Vol.41, No.4, pp.1928-1936, 2014. https://doi.org/10.1016/j.eswa.2013.08.088
- A.C.Squicciarini, D.Lin, S.Sundareswaran, and J.Wede, "Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites," IEEE Trans. Knowl. Data Eng., Vol.27, No.1, pp.193-206, 2015. https://doi.org/10.1109/TKDE.2014.2320729
- K.H.Lee, "A Scheme on Anomaly Prevention for Systems in IoT Environment," Journal of The Korea Internet of Things Society, Vol.5, No.2, pp.95-101, 2019. https://doi.org/10.20465/KIOTS.2019.5.2.095
- I.H.Sarker, A.I.Khan, Y.B.Abushark, and F.Alsolami, "Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions," Mobile Networks and Applications, pp.1-17, 2022.
- D.Sellappan, and R.Srinivasan, "Association rule-mining-based intrusion detection system with entropy-based feature selection: Intrusion detection system," In Handbook of Research on Intelligent Data Processing and Information Security Systems, pp.1-24, 2020.
- L.Ertoz, E.Eilertson, A.Lazarevic, P.N.Tan, V.Kumar, J.Srivastava, and P.Dokas, "MINDS - Minnesota Intrusion Detection System," Next Generation Data Mining, MIT Press, 2004.
- C.Miao, and W.Chen, "A Study of Intrusion Detection System Based on Data Mining," 2010 IEEE Int. Conf. on Inform. Theory and Inform. Security, pp.186-189, 2010.
- N.Khamphakdee, N.Benjamas, S.Saiyod, "Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining," J. ICT Res. Appl., Vol.8, No.3, pp.234-250, 2015. https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.4
- R.Agrawal and R.Srikant, "Fast Algorithms for Mining Association Rules," Proc. 20th VLDB Conf., Vol.1215, pp.487-499, 1994.
- J.Han, J.Pei, and Y.Yin, "Mining Frequent Patterns without Candidate Generation," ACM Sigmod Rec., Vol.29, No.2, pp.1-12, 2000. https://doi.org/10.1145/335191.335372
- A.Y.R.Gonzalez, J.F.Martinez-Trinidad, J.A.Carrasco-Ochoa, J.Ruiz-Shulcloper, "Mining frequent patterns and association rules using similarities," Expert Syst. Appl., Vol.40, pp.6823-6836, 2013. https://doi.org/10.1016/j.eswa.2013.06.041
- R.Agrawal, T.Imielinski, and A.Swami, "Mining association rules between sets of items in large databases," ACM Sigmod Rec., Vol.22, No.2, pp.207-216, 1993. https://doi.org/10.1145/170036.170072
- M.Hahsler, "New Probabilistic Interest Measures for Association Rules," Intelligent Data Anal., Vol.11, No.5, pp.437-455, 2007. https://doi.org/10.3233/IDA-2007-11502
- F.Benites and E.Sapozhnikova, "Evaluation of Hierarchical Interestingness Measures for Mining Pairwise Generalized Association Rules," IEEE Trans. Knowl. Data Eng., Vol.26, No.12, pp.3012-3025, 2014. https://doi.org/10.1109/TKDE.2014.2320722
- University of California, Irvine, "KDD Cup 1999 Data," https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
- University of New Brunswick, "The NSL-KDD Data Set," https://web.archive.org/web/20150205070216/http://nsl.cs.unb.ca/NSL-KDD/