期刊文献+

基于决策树的IDS报警数据融合技术研究 被引量:1

RESEARCH ON IDS SECURITY DATA FUSION TECHNOLOGY BASED ON DECISION TREE
在线阅读 下载PDF
导出
摘要 针对当前多个IDS的相互协作带来的海量报警数据,提出一种基于决策树的IDS报警数据融合技术,介绍决策树及其构造算法ID3,并利用决策树改进IDS报警数据融合中的属性匹配融合技术,提高了融合效率,融合后的报警数据降低了漏警率。实验证明了该方法的有效性。 In order to reduce the amount of security data produced by the collaboration of a lot of intrusion detection systems, the paper puts forward an IDS security data fusion technology based on decision tree and introduces both itself and its building arithmetic called ID3. Then it adopts decision tree to ameliorate the attribute matching fusion technology in IDS security data fusion, so that its fusion efficiency is in- creased and its missing rate of fused security data is decreased. Experiment confirms the validity of the method.
作者 黄正兴 苏旸
出处 《计算机应用与软件》 CSCD 北大核心 2013年第12期258-261,共4页 Computer Applications and Software
关键词 IDS 数据融合 决策树 ID3 匹配属性 IDS Data fusion Decision tree ID3 Matching attribute
  • 相关文献

参考文献9

二级参考文献48

  • 1栾丽华,吉根林.决策树分类技术研究[J].计算机工程,2004,30(9):94-96. 被引量:127
  • 2罗可,林睦纲,郗东妹.数据挖掘中分类算法综述[J].计算机工程,2005,31(1):3-5. 被引量:64
  • 3丁华,张少中,王秀坤.基于改进ID3算法的轨迹化决策研究[J].计算机工程与设计,2004,25(10):1721-1723. 被引量:8
  • 4HOLTE R C. Very simple classification rules perform well on most commonly used datasets[J]. Machine learning, 1993,11(1): 63-91.
  • 5Anderson J P. Computer security threat monitoring and surveillance[EB/OL]. [1980-05-18]. http://csrc.nist.gov/ publications/history/ande 80.pdf.
  • 6Barbara D, Couto J, Jajodia S. ADAM: A testbed for exploring the use of data mining in intrusion detection [J]. SIGMOD, 2001, 30(4): 15-24.
  • 7Stolfo S J, Lee W, Chart P K, et al. Data mining-based intrusion detectors: An overview of the Columbia IDS project[J]. SIGMOD Record, 2001, 30(4): 5-14.
  • 8Ertoz L, Eilertson E, Lazarevic A. The MINDS-Minnesota intrusion detection system in next generation data mining [EB/OL]. [2004-08-09]. http://www.cs.umn.edu/research/ MINDS/MINDS_papers.htm.
  • 9Rahman A, Ezeife C I, Aggarwal A K. WiFi Miner: An online apriori-infrequent based wireless intrusion based wireless intrusion detection system[C]//Proceeding of the 2nd International Workshop on Knowledge Discovery from Sensor Data. Las Vegas, American, 2008: 63-72.
  • 10Agrawal R, Srikant R. Fast algorithms for mining association mles[C]//Proceedings of the 20th International Conference on Very Large Data Bases. Santiago, Chile, 1994: 487-499.

共引文献76

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部