期刊文献+

基于数据挖掘技术的智能化入侵检测模型 被引量:2

An Intelligent Model of Intrusion Detection Based on Data Mining Approach
下载PDF
导出
摘要 给出了一个基于数据挖掘技术智能化入侵检测模型,它由若干个对等式执行入侵检测功能的单元IDU(intrusion detection unit)组成,每个IDU参照通用入侵检测轮廓CIDF(common intrusion detection framework)构建,该模型采用关联规则、序列规则对数据进行挖掘,用判定树分类技术对获得的模式进行分类。实验表明,该模型具有较好的效益。 This paper puts forward an intelligent model of intrusion detection based on data mining approach. It is composed of many intrusion detection units (IDU). Each IDU is built according to the common intrusion detection framework (CIDF). The data mining of association rule and sequence mode is used to come into being rules. The rules are classified by decision tree. These tests showed this model is valid.
作者 张巍
出处 《计算机工程》 CAS CSCD 北大核心 2005年第8期134-136,156,共4页 Computer Engineering
基金 广东省自然科学基金团队资助项目(20003051)
关键词 IDU 异常检测 数据挖掘 滥用检测 关联规则 序列规则 IDU Anomaly detection Data mining Misuse detection Association rule Sequence rule
  • 相关文献

参考文献7

二级参考文献14

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883
  • 8[1]Herve D. Towards a taxonomy of intrusion detection systems. Computer Networks, 1999,31: 805~822
  • 9[2]Kunz T. The influence of different workload description on a heuristic load balancing scheme. IEEE Transaction on Software Engineering, 1991, 17: 725~730
  • 10刘有才,模糊专家系统原理与设计,1995年

共引文献134

同被引文献14

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部