期刊文献+

基于关联规则自动建模的入侵检测模型

The Intrusion Detection Model Based on Association Rules
在线阅读 下载PDF
导出
摘要 介绍了入侵检测的作用、类型和原理,针对入侵检测系统中由于模式库更新不及时造成的高误报率和漏报率,提出了协同数据挖掘的入侵检测模型.该技术依据关联规则,自动发现事物间联系的特性,利用关联规则自动生成模式库,并针对传统Apriori算法的缺陷引入加权关联规则.实验结果表明,该模型对已有的典型攻击检测率为90%以上. In this paper we describe the function, types and theory of intrusion detection. Aiming at the problem of high rate of false negatives and false positives of IDS, which are caused by the older pattern library, we propose the intrusion detection model cooperating with data mining. This technique automatically shows the characteristic of the connection among the things according to the association rules and creates pattern library automatically using association rules. And aming at the limitation of traditional arithmetic of Apriori, we integrate association rules with weighted items. The experiments indicate that the rate of accuracy of detection is above 90%, realizing the target of design,
出处 《哈尔滨理工大学学报》 CAS 2006年第2期94-96,共3页 Journal of Harbin University of Science and Technology
基金 黑龙江省自然科学基金资助项目(F0306)
关键词 入侵检测 数据挖掘 关联规则 自动建模 intrusion detection (ID) data mining association rules automatically creating pattern library
  • 相关文献

参考文献4

  • 1薛英花,吕述望,苏桂平,杨柱.入侵检测系统研究[J].计算机工程与应用,2003,39(1):150-152. 被引量:23
  • 2DAVID H,HEIKKI M,PADHRAIC S.数据挖掘处理[M].张银奎,廖丽,宋俊,译.北京:机械工业出版社,2003.
  • 3陈富赞,寇继凇,王以直.数据挖掘方法的研究[J].系统工程与电子技术,2000,22(8):78-81. 被引量:22
  • 4HANJia—wei MichelineKamber.数据挖掘概念与技术[M].北京:高等教育出版社,2001..

二级参考文献13

  • 11,Braachman R, Anand T. Data Archeology. KDD-93,1993.
  • 22,Jaturon Chaattratichat, John Darlington, Moustafa Ghanem. Large Scale Data Mining: The Challenges and Solutions. KDD-97,1997.
  • 33,Gregory Piatetsky Shapiro, Frawley William J. Knowledge Discovery in Databases. AAAI Press, Menlo Park, CA, 1991.
  • 44,Marcel Holsheimer, Arno Siebes. Data Mining: The Search for Knowledge in Databases. Report CS-R9406, CWI,1994.
  • 55,Rakesh Agrawal, Tomasz Imielinski, Arun Swami. Data Mining: A Performance Perspective. IEEE Trans. on Knowledge and Data Engineering, 1993,5(6): 914~925.
  • 66,Rakesh Agrawal, Ramakrishnan Srikant. Fast Algorithms for Mining Association Rules. In Proc. of the 20th Int′1 Conference on Very Large Databases, Santiago, Chile, 1994.
  • 77,Brachman R J. Integrated Support for Data Archeology. In AIII-93 Workshop on Knowledge Discovery in Database, 1993.
  • 8[1]Julia Allen,Alan Christie,William Fithen et al. State of the Practice of Intrusion Detection Technologies.2000
  • 9[2]An Introduction to Intrusion Detection& Assessment[M].ICSA,Inc
  • 10[3]Network Based Intrusion Detection-A review of technologies[M].DENMAC SYSTEMS ,INC, 1999

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部