期刊文献+

基于Mobile Agent数据挖掘技术的入侵检测系统 被引量:1

Itrusion detection system based on data mining of the mobile agent
在线阅读 下载PDF
导出
摘要 在分析当前入侵检测系统的基础上,提出了基于Mob ile Agent数据挖掘技术的入侵检测系统。该系统通过Mob ile Agent收集入侵检测所需要的数据,并通过数据挖掘产生不同的知识库,在入侵检测系统中建立了一套及时、完整和准确的数据收集机制。 Based on the analysis of the current intrusion system, this article puts forward a sort of data mining model that collects required data via mobile agents and sets up a repository through data mining. Thus, a timely, integrated and exact mechanism is established in intrusion detection system.
作者 景凤宣 连红
出处 《贵州师范大学学报(自然科学版)》 CAS 2006年第2期92-94,107,共4页 Journal of Guizhou Normal University:Natural Sciences
关键词 入侵检测 移动代理 数据挖掘 intrusion detection mobile agent data mining
  • 相关文献

参考文献5

二级参考文献25

  • 1[1]Jiawei Han,Micheline Kamher. Data Mining:Concepts and Techniques [M].China Machine Press,2002
  • 2[2]R Agrawal,T Imielinski,A Swami.Mining association rules between sets of items in large database[C].In:Proc 1993 ACM SIGMOD International Conf on Management of Data, Washington, DC, 1993:207~216
  • 3[3]S Forrest,S A Hofmeyr,A Somayaji et al.A sense of self for unixprocesses[C].In:1996 IEEE Symposium on Security and Privacy,IEEE Computer Society, 1996:120~128
  • 4[4]W Lee,S Stolfo. Data mining approaches for intrusion detetion[C].In:Proc 7th USENIX Security Symposium(SECURITY′98),San Antonio,TX, 1998:79~94
  • 5[5]H Mannila,H Toivonen. Discovering generalized episodes using minimal occurrences[C].In :Proc 2nd International Conf. on Knowledge Dis~covery and Data Mining(KDD′96) ,Portland,OR, 1996:146~151
  • 6[6]F Shi.Genetic algorithms for feature selection in an intrusion detection application[D].Masters thesis. Mississippi State University,Mississippi State, MS, 2000
  • 7[7]R Mukkamala,J Gagnon,S jajodia. Integrating data mining techniques with intrusion detection[C].In:Proc 13th Annual IFIP WG 11.3 Working Conf on Database Security Seattle,WA,1999
  • 8[8]J Luo,S Bridges. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection[C].In:International Journal of Intelligent System,2000; 15(8) :678~703
  • 9[9]S Bridges,R Vaughn. Fuzzy data mining and genetic algorithms applied to intrusion detection[C].In:Proc 23rd National Information Systens Security Conf. Baltimore, MA, 2000
  • 10[10]W Lee,S Stolfo,K Mok. Mining audit data to build intrusion detection models[C].In:Proc 4th International Conf on Knowledge Discovery and Data Mining(KDD′98),New York City,NY,1998:66~72

共引文献35

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部