期刊文献+

基于数据挖掘的入侵检测技术研究综述 被引量:2

Research on Intrusion Detection Technology Based on Data Mining
在线阅读 下载PDF
导出
摘要 入侵检测技术是近年来研究的热点,首先说明入侵检测研究的重要意义和必要性,然后在深入研究数据挖掘技术和入侵检测技术的基础上,针对目前入侵检测系统中存在的一些问题,介绍几种典型的解决方案,并对它们进行比较和分析,讨论今后研究发展方向。 Intrusion detection technology is the research hotspot in recent years, introduces the importance and necessity of researching on intrusion detection. Aiming at some problem existing in the current intrusion detection system, introduces several typical solutions based on the further research on data mining and intrusion detection, and makes comparsion and analysis, discusses the further direction of research and development.
作者 刘小明 熊涛
出处 《现代计算机》 2010年第4期78-80,87,共4页 Modern Computer
关键词 网络安全 入侵检测 数据挖掘 Network Security Intrusion Detection Data Mining
  • 相关文献

参考文献8

  • 1朱岸青,张昌城.基于数据挖掘的网络入侵检测技术研究[J].计算机工程与设计,2008,29(2):318-322. 被引量:16
  • 2HANJ KAMBERM.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 3R Agrawal,T Imielinsld,A.Swami. Mining Association Rules Between Sets of Items in Large Databases[C]. In:Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993,22(2) :207-216.
  • 4Sdkant.Fast Algorithms for Mining Association Rules and Sequential Patterns[C]. Madison: University of Wisconsin, 2003, 24(5) : 324-355.
  • 5Gregory Piatetsky-Shapiro,Usama M.Fayysd,Padhraic Smyth. From Data Mining to Knowledge Discovcry:An Overview. Advances in Knowledge Discovery and Data Mining. AAAI. Mr.Press, 1996,26(7): 1-34.
  • 6杨武,云晓春,李建华.一种基于强化规则学习的高效入侵检测方法[J].计算机研究与发展,2006,43(7):1252-1259. 被引量:12
  • 7穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:50
  • 8Barford P, Kline J, Plonka D, et al. A Signal Analysis of Network Traffic Anomalies[C]. Proceeding of the 2nd ACM SIGCOMM Workshop on Intemet Measurement, Marseille, November 2002 : 123-129.

二级参考文献34

  • 1宋世杰,胡华平,胡笑蕾,金士尧.数据挖掘技术在网络型误用入侵检测系统中的应用[J].计算机工程,2004,30(16):126-127. 被引量:9
  • 2杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:48
  • 3赵月爱,彭新光.高速网络环境下的入侵检测技术研究[J].计算机工程与设计,2006,27(16):2985-2987. 被引量:15
  • 4Richard Stiennon. Intrusion Detection Is Dead-Long Live Intrusion Prevention. http: ∥ www. sans. org/rr/papers/index.php? id= 1028, 2003-06-11.
  • 5Peng Ning, Dingbang Xu. Learning attack strategies from intrusion alerts. The 10th ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., 2003.
  • 6Dan Schnackenberg, Harley Holliday, Randall Smith, et al.Cooperative intrusion traceback and response architecture.DARPA Information Survivability Conference and Exposition(DISCEX II'01), Anaheim, California, 2001.
  • 7Peng Ning, Y. Cui. An intrusion alert correlator based on prerequisites of intrusion. Department of Computer Science,North Carolina State University, Tech. Rep.: TR-2002-01,2002.
  • 8F. Cuppens, A. Miege. Alert correlation in a cooperative intrusion detection framework. The IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
  • 9A. Valdes, K. Skinner. Probabilistic alert correlation. The 4th Int'l Symposium on Recent Advances in Intrusion Detection(RAID 2001), Davis, CA, 2001.
  • 10O. Dain, R. K. Cunningham. Fusing a heterogeneous alert stream into scenarios. The 2001 ACM Workshop on Data Mining for Security Application, Philadelphia, Pennsylvania, 2001.

共引文献116

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部