期刊文献+

基于图的数据挖掘在入侵检测系统中的应用

Graph-based data mining for intrusion detection system
下载PDF
导出
摘要 网络入侵检测系统(IDS)是保障网络安全的有效手段,但目前的入侵检测系统仍不能有效识别新型攻击。根据国内外最新的图数据挖掘理论,设计一个特征子图挖掘算法,并将其应用到入侵检测系统中。该算法挖掘出正常的特征子结构,与之偏离的子结构为异常结构。实验结果表明,该系统在识别新型攻击上具有较高检测率。 Intrusion Detection Systems (IDS) are developing very rapid in recent years, while the networks are being used widely. But most of traditional IDS can't detecting new attacks. Graph-based data mining is a subject that occurred in the past few years. Based on the theory of graph-based data mining, an algorithm of mining the substructures of a graph was designed, and it was applitd into IDS. It can mine normal pattern from graph data. The result of experiment shows that it can detect new attacks efficiently.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第6期1651-1653,共3页 Computer Engineering and Design
关键词 数据挖掘 网络安全 入侵检测 graph data mining network security intrusion detection
  • 相关文献

参考文献6

  • 1Karlton Sequerira, Mohammed Zaki. ADMIT: anomaly-based data mining for intrusions[C]. Canada: Proceedings of the ACM SIGKDD,2002.
  • 2Lin Tsung-Ching,Sun Yeali. Management of abusive and unfair Internet access by quota-based priority control [J]. Computer Networks, 2004, 44(4):441-462.
  • 3Diane Cook J,Lawrence.Holder B. Graph-based data mining[C].USA: IEEE Intelligent Systems, 2000,15(2):32-41.
  • 4Takashi Washio,Hiroshi Motoda. State of the art of graph-based data mining[C]. USA: SIGKDD Explorations MRDM, 2003, 5(1):59-69.
  • 5Caleb Noble C,Diane Cook J.Graph-based an omaly detection [C]. USA: SIGKDD Electronic Edition,2003.631-636.
  • 6http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html [DB/OL].

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部