期刊文献+

网络型误用入侵检测系统中的数据挖掘技术应用 被引量:1

Network intrusion detection system in the application of data mining technology
原文传递
导出
摘要 随着我国社会经济的快速发展,特别是信息技术的发展,计算机在人们的生活工作中得到了广泛的应用。人们利用网络,实现了快速商业化,很多商业活动可以通过网络直接进行。然而,由于网络具有开放、共享等特征,很容易被受到入侵,威胁着网络用户的安全。网络入侵检测系统就是能检测出网络入侵情况的系统,对保护网络安全有十分重要的作用,数据挖掘技术应用与入侵检测系统中,可以提升系统的性能,能在网络出现异常情况时及时的检测出来,增加了网络的安全性能。本文就对数据挖掘技术进行介绍,并探讨其在网络型误用入侵检测系统中的应用。 with the rapid development of social economy in our country, especially the development of information technology, computer is widely used in people's life and work.People use the Internet, realizes the rapid commercialization, many business activities can be carried out directly through the network.However, because the network is open, sharing and other characteristics, is easy to be invaded, threatening the network security.Network intrusion detection system can detect the network intrusion system, is very important to protect the network security, intrusion detection and the application of data mining technology in the system, can improve the system performance, the abnormal situation in the network can be timely detected, increasing the safety performance of the network.In this paper, the data mining technology is introduced, and its application to misuse intrusion detection system in network.
作者 穆俊
出处 《网络安全技术与应用》 2014年第4期48-49,共2页 Network Security Technology & Application
基金 云南省教育厅科学研究基金(No.2012Y258):基于数据挖掘技术的网络入侵检测研究
关键词 误用检测 网络型 数据挖掘技术 misuse detection network data mining
  • 相关文献

参考文献2

二级参考文献13

  • 1吕洁华,张敏敏.数据挖掘技术在个体经营户的应用方法研究[J].商业研究,2006(14):154-156. 被引量:3
  • 2蒋定定,张忠民,张国栋.基于数据挖掘的入侵检测系统设计与研究[J].军民两用技术与产品,2007(6):26-27. 被引量:2
  • 3LEE W.A Data mining framework for constructing feature and model for intrusion detection system[C]. Paper of the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences, columbia university. 1999.
  • 4LEE W.STOLFO S J.MOK K W.Mining in a data-flow environment: Experience in network intrusion detection[A]. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD99)[C]. August 1999.
  • 5LEE W.,STOLFO S J.Data mining approaches for intrusion detection[A]. In Proceedings of the 7th USENIX Security Symposium[C]. San Antonio, TX, January 1998.
  • 6LEE W.STOLFO S J,MOK K W.A data mining framework for building intrusion detection models[A]. In Proceedings of the 1999 IEEE Symposium on Security and Privacy[C].May 1999.
  • 7RAKESH Agrawal,RAMAKISHNAN Srikant. Fast algorithms for mining association rules[A]. :Proc the 20th International Conference on Very Large Databases[C].Santiago, Chile,1994.
  • 8RAKESH Agrawal, RAMAKISHNAN Srikant. Mining sequential patterns[R]. IBM Almaden Research Center, San Jose, California: Research Report RJ 9910, 1994.
  • 9COHEN W W. Fast effective rule induction[A]. In Machine Learning: the 12th International Conference[C].Lake Taho, CA, 1995.
  • 10VernPaxson. Bro: A system for detecting network intruders in real-time[A]. Proc of the Seventh USENIX Security Symp[C]. San Antonin, TX, January 1998.

共引文献18

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部