期刊文献+

基于数据挖掘的协议分析检测模型 被引量:2

Protocol analysis detection mode based on data mining
在线阅读 下载PDF
导出
摘要 针对现有入侵检测系统的不足,根据入侵和正常访问模式的网络数据表现形式的不同以及特定数据分组的出现规律,提出按协议分层的入侵检测模型,并在各个协议层运用不同的数据挖掘方法抽取入侵特征,以达到提高建模的准确性、检测速度和克服人工提取入侵特征的主观性的目的。其中运用的数据挖掘算法主要有关联挖掘、序列挖掘、分类算法和聚类算法。 Facing at the shortage in intrusion detection systems, based on the different data forms and special rules that intrusion and normal access patterns appear. An intrusion detection system modes is put forward according to protocol hiberarchies. In this mode using different data mining algorithms in different protocol hiberarchies, intrusion features were got to improve the intrusion detection system speed and overcome the shortage manual pick-up features. There are several algorithms: association, sequential, classification, clustering.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第7期1701-1703,1826,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60273075)。
关键词 入侵检测 协议分析 模式匹配 数据挖掘 intrusion detection protocol analysis pattern matching data mining
  • 相关文献

参考文献5

二级参考文献25

  • 1(美)无名氏 王锐(译).网络最高安全技术指南[M].北京:机械工业出版社,1998..
  • 2Lary L Peterson Bruce S Davie.计算机网络,2001,06.
  • 3[1]Kumar G.Classification and detection of computer intrusion[D].Purdue University, 1995
  • 4[2]INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION[S].http://www.ietf. org/rfc/rfc0791.txt?number=791,1981-09
  • 5[3]TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION[S].http://www.ietf. org/rfc/rfc0-793.txt?number=793,1981-09
  • 6[4]Protocol Analysis and Command Parsing rs. Pattern Maching in Intrusion Detection System.http://www.networkice.com/products/documentation.html, 2000
  • 7W. Lee and S.J, Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Trans. on Inform, And System Security, 2000.
  • 8Xu L., A. Krzyzak and C,Y, Suen, Methods for Combining Multiple Classifiers and Their Applications to Hand writing Recognition. IEEE Trans, Systems, Man and Cybernetics 22, 1992.
  • 9J Kittler and F. Roli (eds,).Mulfiple Classifier Systems.LNCS 2096, Springer, 2001.
  • 10R, Sekar, V, Guang, S. Verma, and T, Shanbhag. A High Performance Network Intrusion Detection System. In Proceedings of the 6th ACM Conference on Computer and Communications Security, November 1999.

共引文献20

同被引文献21

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部