期刊文献+

IDS中对系统日志的模糊关联规则挖掘研究

Research on Fuzzy Association Rules of Data Mining in System Log in IDS
下载PDF
导出
摘要 论述了如何将模糊集合理论引入关联规则挖掘并应用于入侵检测系统中,以提高入侵检测系统的性能.并以系统日志信息的挖掘为例,验证了模糊关联规则挖掘应用于入侵检测系统的可行性.
出处 《昆明理工大学学报(理工版)》 2005年第z1期377-379,共3页 Journal of Kunming University of Science and Technology(Natural Science Edition)
  • 相关文献

参考文献5

二级参考文献15

  • 1史忠植.高级人工智能[M].北京:科学出版社,1997.60-100.
  • 2Agrawal R, Imieliski T, Swami A. Mining association rules between sets of items in large database[A]. Proc of ACM SIGMOD Intelrnational Conference on Management of Data (SIGMOD'93)[C].1 993. 207 - 216.
  • 3Agrawal R, Srikant R, Vu Q. Mining association rules with item constraints [A]. The Third International Conference on Knowledge Discovery inDatabases and Data Mining[C]. California, August 1997. 327-331.
  • 4Mannila H, Toivonen H. Discovering Generalized Episodes Using Mi nimal Occurrences [ DB/OL ]. http://citeseer. nj. nec. com/mannila96discovering. html Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, OR,August, 1996.
  • 5Lee W,Stolfo S,Mok K. Mining Audit Data to Build Intrusion Detection Models [ C ]. Agrawal R, Stolorz P, editor. Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining,New York,August 27-31,1998,New York:AAAI Press;1998(66-72).
  • 6Luo J. Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection : [ M S Thesis ] [ D ]. Mississippi State University, 1999.
  • 7Wengdong Wang,Susan M. Bridges. Genetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules[ C ]. Presented at the International Joint Conference on Information System,Fuzzy Theory and Technology Conference, Atlantic City, N. J. March 2,2000.
  • 8R Heady,G Luger,A Maccabe et al.The Architecture of a Network level Intrusion Detection System[R].Technical report,CS90-20,Dept of ComputerScience,University of New Mexico,Albuquerque,NM87131
  • 9Stefan Axelsson.Intrusion detection systems:A survey and taxonomy[R]. Technical Report No 99-15,Dept of Computer Engineering,ChalmersUniversity of Technology,Sweden,2000-03
  • 10Wenke Lee.Mining audit data to build intrusion detection models[C].In:Proc Int Conf Knowledge Discovery and Data Mining(KDD'98),1998:66~72

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部