期刊文献+

基于数据挖掘技术的入侵检测系统 被引量:6

An Intrusion Detection System Using Data Mining Techniques
在线阅读 下载PDF
导出
摘要 详细论述了在入侵检测系统中数据挖掘技术的应用,对现有的应用于入侵检测的数据挖掘技术如关联规则、聚类分析、特征分类等进行了分析和综合。结合元挖掘等新概念,本文给出了一个应用数据挖掘技术的入侵检测系统IDSDM框架。该框架具有良好的智能性和自适应性。 This paper discusses the applications of data mining techniques in intrusion detection system,analyzes some of the techniques such as association rules,feature classification and clustering,which are employed for intrusion detection.Based on several nes concepts like metamining,the paper establishes an intrusion detection system frameword IDSDM using data mining techniques.The framework has good adaptability to the environment.
出处 《工业工程》 2003年第3期36-39,共4页 Industrial Engineering Journal
基金 国家自然科学基金资助(60004004 E5303220) 广东省自然科学基金资助(990584)
关键词 数据挖掘技术 入侵检测系统 关联规则 聚类分析 特征分类 计算机网络系统 安全问题 data mining intrsion detection meta-mining IDSDM framework
  • 相关文献

参考文献4

  • 1Lippmann R, Fried D, Graf I, Haines J, et al. Evaluating Intrusion Detection System:The 1998 DARPA Off-Line Intrusion Detection valuation[ A ]. In: Dan. Schnackenberg, Boeing. DARPA. Information Survivability Conference and Exposition[C]. Hilton Head: AAAI Press, 2000.323-325.
  • 2Stolfo S J, Predromidis A L, Tselepis S, et, al. Jam. Java agents for meta-leamingover distributed databases [ A ]. In: Newport Beach. Proceedings of the 3rd International Conference on Knowl- edge Discovery and Data Mining[C] .CA:AAAI Press, 1997.33- 34.
  • 3Han J, Kamber Morgan Katffmann M. Data Mining:Concepts and Techniques 2000[ M ]. New York: Series Editor Morgan Kaufmann Publishers, 2000.1-200.
  • 4Mukkamala R, Gagnon J, Jajodia S. Integrating data mining techniques with intrusion detection methods [ A ]. In: Vijay Atluri and John Hale, Research Advances in Database and Information Systems Security [ C ]. Boston, MA: Kluwer Publishers, 2000.33-46.

同被引文献35

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部