期刊文献+

基于已知特征的入侵衍生特征挖掘算法

Derived Signature Mining Algorithm of Intrusion Based on Known Characteristic
下载PDF
导出
摘要 入侵特征值识别和发现算法是误用入侵检测中的关键技术。入侵衍生特征挖掘提出一种特定的特征值挖掘算法,基于已经知道某种攻击的特征值,找出衍生于这种攻击的变种攻击程序的特征值,并在产生候选项集和数据扫描阶段进行了优化。实验中通过分组数据测试,与通用的SignatureApriori算法进行了对比。实验结果表明,入侵衍生特征挖掘算法在挖掘效率上优于SignatureApriori。 The recognition and discovery algoritnms of intrusive signature are the core technologies of misuse intrusion detection.Derived signature mining algorithm provides a new kind of signature mining algorithm.Based on the known characteristic values of certain attacks,the algoritnm can compute and find out the new and mutational signature values from the attack and optimizes the procedure in what candidated itemsets is provided and database is scanned.In the experiment,tested data divided into different groups,which is used to compare the proposed algorithm with Signature Apriori algorithm,which is a general signature mining algorithm in intrusion dtection field.The results of concerned experiments indicates that the derived signature mining algorithm is superior to Signature Apriori algorithm in mining efficiency.
作者 牛建强 陈昕
出处 《计算机工程与应用》 CSCD 北大核心 2005年第20期127-130,134,共5页 Computer Engineering and Applications
基金 北京优秀人才培养专项资助项目(编号:20042D0500701)
关键词 入侵检测 数据挖掘 SIGNATURE APRIORI Intrusion Detection,Data Mining,Signature Apriori
  • 相关文献

参考文献8

  • 1Lee W,Stolfo S J.A Framework for Constructing Features and Models for Intrusion Detection Systems[J].ACM Transactions on Information and System Security, 2000; 3 ( 4 ): 227~261
  • 2Barker C R.Measurement Analysis and Anomaly Detection[C].In:Proceeding of IEEE Systems Readiness Technology Conference, Los Angeles: CA IEEE Press,2003: 226~237
  • 3Han H,Lu X L,Ren L Y.Using Data Mining to Discover Signatures in Network - Based Intrusion Detection [ C ]. In: Proceeding of MachineLearning and Cybernetics,Los Angeles:CA IEEE Press,2002:13~17
  • 4韩家炜 Michelin K.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 5Liu D ,Wang H ,Wang X.Data Mining For Intrusion Detection[C].In:Proceeding of ICII,Los Angeles:CA IEEE Press,2001:7~12
  • 6Berry M J A,Linoff G S.Data Mining Techniques[M].New York:John Wiley & Sons,Inc, 1997:184~195
  • 7Ye N,Emran S M,Chen Q et al. Multivariate Statistical Analysis of Audit Trails for Host Based Intrusion Detection[J].IEEE Transaction on Computers,2002 ;51 (7) :810~820
  • 8http ://www.sourcefire.com/services/snort_rules.html

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部