期刊文献+

基于关联规则挖掘的入侵检测算法研究

Research on the Intrusion Detection algorithm Based on the association rule mining
原文传递
导出
摘要 本文分析无线网络入侵检测的特点,提出来基于时间窗口关联规则挖掘算法。分析与实验结果表明,基于时间窗口关联规则挖掘算法在效率等方面更优越,在入侵检测中取得了较好的效果。 This paper analyzes the features of wireless network intrusion detection,proposed a new the association rule mining based on time windows.Theoretical analysis and experimental results show that the association rule mining algorithm is superior.It has achieved better results in the field of intrusion detection.
作者 吴斌 陆培军
出处 《网络安全技术与应用》 2012年第2期34-36,共3页 Network Security Technology & Application
基金 南通市科技计划项目(批准号:K2010065)资助
关键词 关联规则 入侵检测 无线网络 association rule intrusion detection Wireless Network
  • 相关文献

参考文献8

  • 1sHAN J W, KAMBER M.范明,孟小峰译.数据挖掘-概念与技术[M].北京:机械工业出版社.2001.
  • 2AGRAWAL R,SBIKANT R. Fast algorithms for mining association rules[C]//Proceedings of 1994 International Conference on Very Large Data Bases(VLDB94).Santiago:[s.n.]. 1994.
  • 3Lee W, Stolfo S. Mining in a Data-Flow Environment: Experience in Network Intrusion Deteetion [C] //Procof the ACMSIGKDD Int'l Conf Knowledge Discovery& Dat aMining. 1999.
  • 4范明,李川.在FP-树中挖掘频繁模式而不生成条件FP-树[J].计算机研究与发展,2003,40(8):1216-1222. 被引量:56
  • 5Barbara D,Couto J,Jajodia S,Popyack L,Wu N.ADAM:Detecting Intrusions by Data Mining.ln:IEEE workshop on Information Assurance and Security.2001.
  • 6Lee W.Stolfo S J.A Framework for Constructing Features and Models for Intrusion Detection Systems.ACM Transactions on Information and System security.2000.
  • 7王克刚,王丽君,陈升,刘宏斌.基于Apriori改进算法的入侵检测系统的研究[J].计算机应用与软件,2009,26(4):262-265. 被引量:4
  • 8陈晓梅.入侵检测中的数据预处理问题研究[J].计算机科学,2006,33(1):81-83. 被引量:13

二级参考文献24

  • 1黄水源,周理凤,段隆振,黄龙军.数据挖掘技术在入侵检测中的应用[J].微计算机信息,2006,22(08X):35-38. 被引量:4
  • 2顾健辉,孙力娟.数据挖掘技术在入侵检测中的应用研究[J].计算机技术与发展,2006,16(9):243-244. 被引量:5
  • 3Hu X H,Cereone N. Learning in relational databases :A rough set approach.Intl. Journal of Computational Intelligence, 1995, 11(2):323-338.
  • 4Axelsson S. The base-rate fallacy and its implications for the difficulty of intrusion detection, In:Tsudik, Ged. Proc. of the 6^th Conf.on Computer and Communication Security. New York: ACM Press, 1999.1 -7.
  • 5Hsu C W,Lin C J . A comparison of methods for multiclass support vector machines. IEEE Trans. on Neural Networks, 2002,13(2) :415-425.
  • 6UCI Repository of Machine Learning Databases. http:// www.ics. uci. edu/-mlearn/MLR Repository. html.
  • 7王亚英.基于粗集理论的知识发现方法研究:[博士学位论文].上海:上海交通大学,2000.
  • 8Biermann E, Cloete E, Venter L M. A Comparison of Intrusion Detection systems [ J ]. Computers & Security, 2001,20 ( 8 ) : 676 - 683.
  • 9Abrar Ahmad Qureshi. Network Intrusion Detection Using An Innovative Statistical Approach[D]. Florida: Florida Institute of Technology,2006.
  • 10Ganger G R, Nagle D F. Better security via smarter devices [ A ]. Hot Topics in Operating Systems[ C ]. : IEEE ,2001,100 - 105.

共引文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部