期刊文献+

数据挖掘技术在网络入侵检测中的应用分析 被引量:1

下载PDF
导出
摘要 数据挖掘技术已在误用检测和异常检测中得到应用。文章介绍了数据挖掘和入侵检测的有关知识,并且分析了基于数据挖掘的入侵检测系统的体系结构和综合误用检测和异常检测的模型得工作过程。
出处 《沿海企业与科技》 2005年第2期156-158,共3页 Coastal Enterprises and Science & Technology
  • 相关文献

参考文献2

二级参考文献14

  • 1[1]Jiawei Han,Micheline Kamher. Data Mining:Concepts and Techniques [M].China Machine Press,2002
  • 2[2]R Agrawal,T Imielinski,A Swami.Mining association rules between sets of items in large database[C].In:Proc 1993 ACM SIGMOD International Conf on Management of Data, Washington, DC, 1993:207~216
  • 3[3]S Forrest,S A Hofmeyr,A Somayaji et al.A sense of self for unixprocesses[C].In:1996 IEEE Symposium on Security and Privacy,IEEE Computer Society, 1996:120~128
  • 4[4]W Lee,S Stolfo. Data mining approaches for intrusion detetion[C].In:Proc 7th USENIX Security Symposium(SECURITY′98),San Antonio,TX, 1998:79~94
  • 5[5]H Mannila,H Toivonen. Discovering generalized episodes using minimal occurrences[C].In :Proc 2nd International Conf. on Knowledge Dis~covery and Data Mining(KDD′96) ,Portland,OR, 1996:146~151
  • 6[6]F Shi.Genetic algorithms for feature selection in an intrusion detection application[D].Masters thesis. Mississippi State University,Mississippi State, MS, 2000
  • 7[7]R Mukkamala,J Gagnon,S jajodia. Integrating data mining techniques with intrusion detection[C].In:Proc 13th Annual IFIP WG 11.3 Working Conf on Database Security Seattle,WA,1999
  • 8[8]J Luo,S Bridges. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection[C].In:International Journal of Intelligent System,2000; 15(8) :678~703
  • 9[9]S Bridges,R Vaughn. Fuzzy data mining and genetic algorithms applied to intrusion detection[C].In:Proc 23rd National Information Systens Security Conf. Baltimore, MA, 2000
  • 10[10]W Lee,S Stolfo,K Mok. Mining audit data to build intrusion detection models[C].In:Proc 4th International Conf on Knowledge Discovery and Data Mining(KDD′98),New York City,NY,1998:66~72

共引文献14

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部