期刊文献+

基于数据发掘的入侵检测建模 被引量:1

Building Intrusion Detection Model Based on Data Mining
原文传递
导出
摘要 所谓数据发掘DataMining,就是从大量数据中发掘新的、有用模式的过程。把数据发掘用于入侵检测,可以从审计数据中发掘出具有系统活动特征的有用的模式,以指导、训练数据的收集和特征的选择和建立活动分类机制。为此,进行了基于DM的入侵检测模型的建立过程和所用算法的研究。 :Data mining is a process of identifying novel and potentially useful patterns in data.Using DM technique to intrusion detection,the useful patterns of system behavior features can be discovered in au-dit data.The discovered patterns can guide the audit data gathering and feature selection and build the behavior classified system.In this paper we study the process of building ID model and the algorithms that were used.
出处 《天津通信技术》 2001年第3期6-10,共5页 Tianjin Communications Technology
基金 华为科学基金资助项目
关键词 入侵检测 数据开采 审计数据 模型 Intrusion detection Data mining Audit data Model
  • 相关文献

参考文献7

  • 1[1]D.E.Denning.AnIntrusion-Detection Model.IEEE Trans-actions on Software Engineering.1987,13(2).
  • 2[2]Anderson D,Frivold Th,Valdes A. Next-genera-tion Intrusion-Detection Expert System(NIDES)A Summary,SRI-CSL-95-07,SRI International,Menlo Park,CA.1995,5.
  • 3[3]Lee W,Stolfo S J.Data Mining Approaches for Intrusion Detection. In Proceeding of the 7th USENIX Security SymposiumSan Antonio,TX.1998,1.
  • 4[4]R.Agrawal,R.Srikant.Fast Algorithms for Mining Association Rules. Proceeding of the 20th VLDB Conference Santiago Chile.1994.
  • 5[5]H.Mannila and H.Toivonen. Discovering gen-eralized episodes using minimal occurrences.Proceedings of the 2nd International Confer-ence on KDD and DM. 1996,8.
  • 6[6]William W.Cohen. Fast Effective Rule Induc-tion. From Machine Learning Proceedings of the 12th International Conference.1995.
  • 7[7]T.Mitchell. Machine Learning. McGraw-Hill.1997.

同被引文献4

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部