期刊文献+

一种基于滑动窗口技术的入侵检测方法 被引量:3

An intrusion detection method based on sliding window technology
在线阅读 下载PDF
导出
摘要 网络数据流在一段时间内会发生概念性变化,这可能会降低入侵检测的精度。针对网络数据流的这一特性,提出了一种能识别并适应概念飘移的基于滑动窗口的入侵检测方法,它能根据数据流的概念漂移的状况自动调整训练窗口并对检测模式进行及时的更新。 The data collected from network will change over a period of time in underlying concepts. This lowers the predictive precision of the detection. This paper proposes a method based on sliding window which can adapt to occurrence of concept drifting according to the characteristics of the network data stream. It can dynamically adjust the size of the training window and the detection model according to the current rate of concept drifting.
出处 《信息技术》 2009年第7期166-167,170,共3页 Information Technology
关键词 入侵检测 滑动窗口 概念漂移 数据挖掘 数据流 intrusion detection sliding window concept drifting data mining data stream
  • 相关文献

参考文献5

二级参考文献51

  • 1李平,黄迪明.基于智能体的自适应入侵检测系统[J].成都信息工程学院学报,2004,19(4):535-540. 被引量:1
  • 2[1]QUINLAN J R.Induction on decision trees[J].Machine Learning,1986,13 (1):81-106.
  • 3[2]QUINLAN J R.C4.5:programs for machine learning[M].San Mateo:Morgan Kaufmann,1993.
  • 4[3]BREIMAN L,FRIEDMAN J,OLSHEN R,et al.Classification and regression trees monterey[M].Belmont:Wadsworth International Group,1984.
  • 5[4]HELMBOLD D P,LONG P M.Tracking drifting concepts by minimizing disagreements[J].Machine Learning,1994,21(14):27-45.
  • 6[5]WANG H,FAN W,YU P,HAN J.Mining conceptdrifting data streams using ensemble classifiers[A].The 9th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD's 03)[C].New York:ACM Press,2003.
  • 7[6]GANTI V,GEHRKE J,RAMAKRISHNAN R.Mining data streams under block evolution[A].SIGKDD's 02[C].New York:ACM Press,2002.
  • 8[7]WIDMER G,KUBAT M.Learning in the presence of concept drift and hidden contexts[J].Machine Learning,1996,23(1):69-101.
  • 9[8]DOMINGOS P,HULTEN G.Mining high-speed data streams[A].In Proceedings of the Association for Computing Machinery Sixth International Conference on Knowledge Discovery and Data Mining[C].New York:ACM Press,2000.
  • 10[9]PAPADIMITRIOU S,FALOUTSOS C,BROCKWELL A.Adaptive,hands-off stream mining[A].Proceedings of the 29th International Conference on Very Large Data Bases(VLDB's03)[C].Berlin:Springer Press,2003.

共引文献32

同被引文献15

  • 1潘立强,李建中,王伟平.数据流上加权共享滑动窗口的连接查询处理算法[J].计算机工程与应用,2005,41(27):160-163. 被引量:2
  • 2方金和,冯雁,王瑞杰.基于数据挖掘的自适应入侵检测研究[J].计算机工程与应用,2006,42(18):152-154. 被引量:4
  • 3LEE W,STOLFO S J,MOK K W.A data mining framework for building intrusion detection models[C] //Proc of IEEE Symposium on Security and Privacy.Berlin:Springer,1999:120-132.
  • 4GOLAB L,OZSU M T.Issues in data stream management[J].ACM SIGMOD Record,2003,32(2):5-14.
  • 5翁小清,沈钧毅.多变量时间序列异常样本的识别[J].模式识别与人工智能,2007,20(4):463-468. 被引量:3
  • 6丁有军.基于数据挖掘的入侵检测研究与应用[J].西安电子科技大学学报,2005,25(13):256.
  • 7任建平.基于数据挖掘的实时入侵检测系统的研究[J].计算机工程,2006,18(1).
  • 8林龙涛.基于数据挖掘的网络入侵检测系统[c]//青岛市第四届学术年会论文集,2005:110-111.
  • 9Petrovic S, Bakke S.lmproving the efficiency of misuse detection by means of he q-gram distance[C]//Proceedings of the 4th International Conference on Information Assurance and Security,DC USA,2008:205-208.
  • 10姜远,刘力平.数据流挖掘技术[J].江南大学学报(自然科学版),2007,6(6):654-657. 被引量:2

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部