期刊文献+

信息熵理论与入侵检测聚类问题研究 被引量:14

Study on Clustering Problem for Intrusion Detection with Information Entropy
下载PDF
导出
摘要 将信息熵理论应用到入侵检测聚类问题中,实现了一种启发式入侵检测聚类算法HBEC,它能递增地处理巨大的网络连接记录数据库.通过实验证明了算法HBEC对解决入侵检测问题是有效的,并且具有很强的增量挖掘能力. This paper applies the theory of information entropy to the clustering problem for intrusion detection, and realizes the heuristic algorithm HBEC to solve the clustering problem for intrusion detection, which can deal with the database with large connection records incrementally. The experiment shows that HBEC is effective to resolve the intrusion detection problem and has the strongly incremental mining ability.
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第7期1163-1166,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60273075)资助
关键词 人侵检测 数据挖掘 聚类 信息熵 intrusion detection data mining clustering information entropy
  • 相关文献

参考文献10

  • 1Klaus Julish. Data mining for intrusion detection:a critical review[R]. Switzerland:IBM Research, Zurich Research Laboratory, 2001.
  • 2Portnoy L, Eskin E, Stolfo S J. Intrusion detection with unlabeled data using clustering[C]. In:Proceedings of the ACM CCS Workshop on Data Mining for Security Applications,2001.
  • 3Han J, Kamber M. Data mining: concepts and techniques[M]. Morgan Kaufmann Publisher,2000.
  • 4Jain A, Murty M, Flynn P. Data clustering: a review[J]. ACM Computing Surveys, 1999, 31(3):513-521.
  • 5Guha S, Rastogi R, Shim K. ROCK: A robust clustering algorithm for categorical attributes[J]. Information Systems, 2000, 25(5):345-366.
  • 6Daniel Barbara, Julia Couto, Yi Li. COOLCAT: An entropy-based algorithm for categorical clustering[D]. George Mason University, Information and Software Engineering Department, October 1,2001.
  • 7Periklis Andritsos, Panayiotis Tsaparas, Renee J.Miller et al. LIMBO:a scalable algorithm to cluster categorical data[R]. University of Toronto, Department of Computer Science, 2003,7.
  • 8Li Xiang-yang. Clustering and classification algorithm for computer intrusion detection[D]. Arizone State University,2001.
  • 9Wenke Lee, Dong Xiang. Information-theoretic measures for anomaly detection[D].Computer Science Department, North Carolina State University, 2000.
  • 10Garey M,Johnson D.Computers and intractability:a guide to the theory of NP-completeness[M]. W.H.Freeman,1979.

同被引文献122

引证文献14

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部