期刊文献+

数据挖掘技术在网络入侵检测中的应用 被引量:6

The Application of the Data Mining Technology in Network Intrusion Detection
在线阅读 下载PDF
导出
摘要 基于通用入侵检测轮廓,建立了一个基于数据挖掘技术的异常检测模型,采用关联规则、序列规则对数据进行挖掘,用判定树分类技术对获得的规则进行分类.实验表明,本模型具有较好的效益. Put forward a model of network intrusion detection based on data mining approach. Association rule and sequence mode for building intrusion detection models and detecting anomaly are realized. The rules are classified by decision tree. These tests showed this model is valid.
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2006年第1期54-57,共4页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 广东省自然科学基金(04107411) 广东省科技计划(2005B16001095 2005B10101077)资助项目
关键词 入侵检测轮廓 异常检测 数据挖掘 关联规则 序列规则 CIDF anomaly detection data mining association rule sequence rule
  • 相关文献

参考文献11

二级参考文献34

  • 1边肇祺.模式识别[M].北京:清华大学出版社,1998..
  • 2[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 3[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 4[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 5[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 6[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 7[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 8[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 9[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 10[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989

共引文献138

同被引文献36

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部