期刊文献+

基于异常检测的模糊行为序列挖掘算法研究

Algorithm of Mining Ambiguous Sequential Patterns in Intrusion Detection
下载PDF
导出
摘要 异常检测是入侵检测的一种重要手段,异常检测的关键在于正常模式的刻画,而正常模式的质量取决于数据的质量。对于纯净(不带噪声)的数据,正常模式的准确度相对较高;对于不太纯净的数据,就有可能丢掉某些真正的用户特征,从而会增加误警率。基于此提出了一个ASM用户行为序列特征挖掘算法,该算法结合数据挖掘中的序列挖掘方法,利用模糊匹配技术来挖掘隐藏在噪声背后的用户行为序列。实验表明,采用模糊匹配技术为入侵检测提取正常序列模式是可行的、有效的。 User's behavior always reflects the identity and habit of him. Therefore, extracting user's behavior feature from the communication between user and computer is important and significant, especially in intrusion detection field. Unfortunately, user's behavior usually is distorted for the existing of some noise. Support measure of sequential patterns mining does not serve this purpose. Propose a new algorithm based on ambiguous match measure to extract real support for each user, and accordingly provide strong testimony for anomaly intrusion system.
出处 《计算机应用研究》 CSCD 北大核心 2005年第1期44-46,共3页 Application Research of Computers
基金 国家自然科学基金资助项目 湖北省教育厅科学研究计划项目 (2 0 0 3A0 1 1 )
关键词 行为特征 序列挖掘 模糊匹配 噪声 Behavior Feature Sequence Mining Ambiguous Match Noise
  • 相关文献

参考文献13

  • 1连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:84
  • 2J Yang, W Wang. Mining Long Sequential Patterns in a Noisy Environment[ C]. Proceedings of the 2002 AC SIGMOD International Conference on Management of Data, ACM Press,2002. 406-409.
  • 3E Eskin. Anomaly Detection over Noisy Data Using Learned Probability Distributions[ C]. Proceedings of the 17th International Conference on Machine Learning (ICML2000) ,2000. 237-243.
  • 4T Lane,C E Brodley. Sequence Matching and Learning in Anomaly Detection for Computer Security [ C ]. Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, Menlo Park, CA:AAAI Press, 1997.43-49.
  • 5R Aggrawal,et al. Mining Sequential Patterns[ C]. Proc of the Int'l Conference on Data Engineering (ICDE), Taipei, Taiwan, 1996.
  • 6Wenkle Lee. A Data Framework for Construetueting Features and Models for Intrusion Detection Systems [ D]. Columbia University,1999.
  • 7Xiangyang Li. Clustering and Classification Algorithm for Computer Intrusion Detection[ D]. 2001.
  • 8J Yang, W Wang. Mining Long Sequential Patterns in a Noisy Environment[C].Proceedings of the 2002 AC SIGMOD International Conference on Management of Data, ACM Press,2002.406-409.
  • 9E Eskin.Anomaly Detection over Noisy Data Using Learned Probability Distributions[C].Proceedings of the 17th International Conference on Machine Learning (ICML2000),2000.237-243.
  • 10T Lane,C E Brodley. Sequence Matching and Learning in Anomaly Detection for Computer Security[C].Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, Menlo Park, CA:AAAI Press,1997.43-49.

二级参考文献7

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883

共引文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部