期刊文献+

关联规则和序列模式算法在入侵检测系统中的应用 被引量:8

Application of association rules and sequence patterns algorithm to IDS
在线阅读 下载PDF
导出
摘要 将关联规则算法与序列模式算法应用于入侵检测系统中,介绍了将扩展的关联规则Apriori算法与序列模式GSP算法相结合,挖掘原始审计数据中频繁模式的过程,并实现了这两种算法在入侵检测中的应用。 The purpose of the data mining is to find out the relativity from a large number of data. The application of the association rules algorithm and the sequence patterns algorithm to IDS is presented and the process of mining frequency patterns from the raw audit data with the extended apriori association rules and the GSP sequence patterns algorithm combined is introduced. Finally the application is realized.
出处 《成都信息工程学院学报》 2004年第1期1-6,共6页 Journal of Chengdu University of Information Technology
基金 国家863课题研究成果(2001A142030)
关键词 关联规则 序列模式 频繁模式 入侵检测 association rule sequence pattern frequency pattern intrusion detection
  • 相关文献

参考文献12

  • 1胡华平,陈海涛,黄辰林,唐勇.入侵检测系统研究现状及发展趋势[J].计算机工程与科学,2001,23(2):20-25. 被引量:53
  • 2连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:85
  • 3Jiawei Han,Jian Pei.Simon Fraser Sequential Pattern Mining:From Shopping History Analysis to Weblog and DNA Mining.University,Canada:
  • 4Wenke.Lee.A Aata Mining for Constructing Feature and Model for Intrusion Detection System[D].COLUMBIA UNIVERSITY,1999.
  • 5Wenke.Lee.,S.J.Stolfo,K.W.Mok.Algorithms For Mining System Audit Data[R].In Proceedings of the 1999 IEEE Symposium on Security and Privacy,1999.
  • 6R.Agrawal,T.Imielinaki,A.Swami.Mining assosiation rules between sets of items in large database[C].Washington,D.C:In Proc.of the ACM SIGMOD Conference on Management of Data,1993:207-216.
  • 7R.Agrawal,R.Srikant,Mining Sequential Patterns[R].Proceedings of the 11th International Conference on Data Engineering,1995.
  • 8R.Agrawal and R.Srikant.Mining Sequential Patterns:Generalizations and Performance Improvements[R].Proceeding of the Fifth Int'l Conference on Extending Database Technology (EDBT),1996:3-17.
  • 9R.Agrawal,A.Arning,T.Bollinger,M.Mehta,J.Shafer,R.Srikant:The Quest Data Mining System[R].Portland:Proc.of the 2nd Int'l Conference on Knowledge Discovery in Databases and Data Mining,Portland,1996.
  • 10R.Agrawal and R.Srikant.Mining Generalized Assosiation Rules[R].Zurich:In Proceeding of the 21st Int'l Conference on Very Large Database,1995.

二级参考文献9

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883
  • 8赵海波,李建华,杨宇航.网络入侵智能化实时检测系统[J].上海交通大学学报,1999,33(1):76-79. 被引量:37
  • 9黄辰林,赵辉,胡华平.基于分布自治代理的层次入侵检测系统设计[J].计算机工程与应用,2001,37(6):47-49. 被引量:12

共引文献135

同被引文献31

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部