期刊文献+

基于加权关联规则的端口扫描检测 被引量:1

The Application of Weighted Association Rules in Port Scanner Detection
下载PDF
导出
摘要 在深入研究了端口扫描检测中传统关联规则算法的应用的基础上,提出了将加权关联规则算法应用到端口扫描检测中。该方法不但可以及时发现缓慢扫描、分布式扫描以及多种隐蔽扫描,而且有效地解决了传统关联规则算法中因未考虑网络数据固有的时间特性而引起的漏检问题。 The application of traditional association rules algorithm in Port Scanner Detection is discussed in this paper. The application of Weighted Association Rules in Port Scanner Detection is proposed on base of it. Slow scanning and types of stealth scannings etc. Can be detected by this technique. The problom of missing detection in traditional association rules algorithm because of no considering of time effect in the data of network is solved effectively.
作者 赵鹏 薛冰冰
出处 《现代计算机》 2006年第8期23-25,共3页 Modern Computer
关键词 网络安全 端口扫描 加权关联规则 Network Security Port Scanner , Weighted Association Rule
  • 相关文献

参考文献6

二级参考文献17

  • 1[1]Honeynet http:∥proj ect.honeynet.org/
  • 2[2]Honeynet Know Your Enemy: Statistics http://roject.honeynet. org/papers/stats/23 July, 2001.
  • 3[3]Heberlein, L.T.,G.Dias,K. Levitt,B.Mukherjee,J.Wood, and D.Wolber,network security moniter,Proc.,1990 Symposium on Research in Security and Privacy,pp.296-304,Oakland,CA,May 1990.
  • 4[4]Stantiford-Chen S.,S.Cheung,R,Crawford,M.Dilger,J.Frank,J.Hoagland,K.Levitt,C.Wee,R.Yip,D.Zerkle,rIDS-A Graph-Based Intrusion Detection System for Large Networks The 19th National Informaion Systems Security Conference.
  • 5[1]Fyodor.The Art of Scanning[EB/OL].Phrack 51 www. phrack. com
  • 6[2]CERT Advisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks. 24 September 1996.
  • 7[3]Phrack .Port Scanning without the SYN flag / Uriel Maimon. Phrack 49-15.
  • 8[4]Stuart Staniford, Jams A. Hoagland ,et al. Practical Automated.
  • 9[1]Lee Wenke, Stolfo S J, Mok K W. A Data Mining Framework for Building Intrusion Detection Models. Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999: 120-132
  • 10[2]Basu R, Cunninghuam R H, Webster S E, et al. Detecting Low-profile Probes and Novel Denial-of-Service Attacks. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001-06

共引文献41

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部