期刊文献+

入侵检测中的数据挖掘分析方法 被引量:3

Data Mining Methods in Intrusion Detection
下载PDF
导出
摘要 入侵检测随着网络的发展而受到人们的重视。数据挖掘技术旨在从大量的数据中提炼出抽象的知识,揭示出蕴含在这些数据背后的客观规律,实现知识的自动获取。将数据挖掘与入侵检测结合起来能够提高入侵检测系统的智能性、准确性和检测效率。文章论述了数据挖掘分析方法在入侵检测中的应用,给出一种基于数据挖掘的入侵检测系统模型。 Intrusion detection is gathering more attention with the development of network. Data mining methods aim to abstract some useful knowledge for a mass of data, and open out the objective rules behind these data. To incorporate data mining and intrusion detection can improve the intelligence, veracity and inspection efficiency of intrusion detection system. The paper describes the application of data mining methods in intrusion detection and proposes a new intrusion detection system based on data mining.
出处 《合肥学院学报(自然科学版)》 2004年第3期26-29,共4页 Journal of Hefei University :Natural Sciences
关键词 网络入侵 入侵检测 数据挖掘 关联分析方法 分类分析方法 聚类分析 intrusion detection data mining association classification clustering, sequential pattern
  • 相关文献

参考文献9

二级参考文献62

  • 1张正荣.传热学[M].北京:人民教育出版社,1982..
  • 2Jiawei Han等 范明(译).数据挖掘概念与技术[M].北京:机械工业出版社,2000,8.全书.
  • 3Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 4T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 5http:∥www. phrack. org.
  • 6D Malkhi and M Reiter. Unreliable Intrusion Detection in Distributed Computations, Proc. of the 10th Computer Security Foundations Workshop, Rockport, MA, June 1997:116 ~ 124.
  • 7Paxson V . Bro: A System for Detecting Network Intruders in Real- Time. In Proc. of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
  • 8The LIDS Project. http: ∥www. lids. org.
  • 9Snapp S R, Brentano J, Dias G V, et al. DIDS - Motivation,Architecture and an Early Prototype, Proc. of the 14th National Computer Security Conference, Washington, D C.,Oct. 1991:167 ~ 176.
  • 10Eugene H Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Computer Networks, October2000, 34(4): 547 ~ 570.

共引文献485

同被引文献11

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部