期刊文献+

基于数据挖掘的网络数据库入侵检测系统 被引量:30

Research on Intrusion Detection System for Network Database based on Data Mining
在线阅读 下载PDF
导出
摘要 提出一种基于数据挖掘的网络数据库入侵检测模型 (NDBIDS) ·讨论了NDBIDS的结构及各部件的功能·利用关联规则Apriori算法 ,对用户正常历史数据进行挖掘 ,并对产生的规则进行归并更新 ,通过训练学习生成异常检测模型 ,并利用此模型实现基于数据挖掘的异常检测·NDBIDS可以检测伪装攻击、合法用户的攻击和攻击企图三种类型的攻击 ,通过实验给出了相应攻击的检测率、假报警率、漏报率和检测正确率·本系统的建立不依赖于经验 。 An intrusion detection system model for network database NDBIDS based on data mining was proposed. The framework of the intrusion detection system and the function of components were discussed. The users' normal historical data were mined by the Apriori association rule algorithm. The anomaly detection model was implemented by merging and updating the rules. Three kinds of attacks, masquerading, penetration and intrusion attemp, can be detected by NDBIDS. The corresponding detection rate, false alarm rate, missing report rate and correctness rate were computed. The construct of system does not depend on experiences, so it has good flexibility.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第3期225-228,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目 ( 90 10 40 0 5 60 173 0 5 1) 国家'八六三'高技术计划CIMS主题项目 ( 2 0 0 1AA415 2 10 )
关键词 网络数据库 数据挖掘 关联规则 入侵检测 攻击 数据库安全 data mining association rule intrusion detection attack database security
  • 相关文献

参考文献10

  • 1王丽娜,董晓梅,于戈,王东.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110. 被引量:20
  • 2Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
  • 3Spafford E H,Zamboni D. Intrusion detection using autonomous agents[J]. Computer Networks, 2000,34(4):547-570.
  • 4HANJ KAMBERM 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 5Lee W, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models[A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C]. Oakland: IEEE, 1999.120-132.
  • 6Lee W, Stolfo S J, Mok K W. Mining audit data to build intrusion detection models[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
  • 7Lee W, Stolfo S J, Mok K W. Mining in a data-flow environment: experience in network intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
  • 8Feiertag R, Rho S, Benzinger L,et al. Intrusion detection inter-component adaptive negotiation[J]. Computer Networks, 2000,34(4):605-621.
  • 9Lee W, Stolfo S J. Data Mining approaches for intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2000-12-03.
  • 10Manganaris S, Christensen M, Zerkle D, et al. A data mining analysis of RTID alarms[J]. Computer Networks, 2000,34(4):571-577.

二级参考文献3

共引文献63

同被引文献165

引证文献30

二级引证文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部