期刊文献+

基于关联规则的入侵检测系统 被引量:11

Intrusion Detection System Based on Association Rules
下载PDF
导出
摘要 为提高入侵检测系统的智能性、准确性和检测效率,针对入侵检测系统的特点,将数据挖掘技术应用于入侵检测系统。阐述了使用关联规则及其优化算法,对日志文件进行特征分析与知识发掘的入侵检测系统的设计与实现。实验表明,优化后的算法在对某一日志文件的入侵检测中,准确率平均提高45%,检测效率平均提高50%,大大增强了入侵检测系统的性能。 To improve the intelligence, precision and efficiency of IDS ( Intrusion Detection System), the paper applies data mining technology to IDS according to the characteristics of the system. It describes how to acquire the intrusion knowledge from the logs and detect the intrusion behaviors based on the improved association rules algorithm. The results of experiments show that the precision of IDS, using the improved algorithm on a certain log is increased by 45 percent and the efficiency is increased by 50 percent. The optimized algorithm actually improves the performance of IDS.
出处 《吉林大学学报(信息科学版)》 CAS 2006年第2期204-209,共6页 Journal of Jilin University(Information Science Edition)
基金 振兴老工业基地科技公关基金资助项目(04-02GG158)
关键词 关联规则 数据挖掘 入侵检测 日志 association rules data mining intrusion detection log
  • 相关文献

参考文献10

  • 1JIN SUK KIM,HOHN GYU LEE,SUNGBO SEO,et al.CTAR:Classification Based on Temporal Class-Association Rules for Intrusion [J].Lecture Notes in Computer Science,2004,2908:84-96.
  • 2GIUDICI P.Applied Data Mining Statistical Methods For Business and Industry [M].America:John Wiley & Sons,2003.
  • 3JOHN MCHUGH.Intrusion and Intrusion Detection [DB/OL].[2001-07].http://springer.lib.tsinghua.edu.cn/.
  • 4DANIEL BARBAR'A,PING CHEN,ZOHREH NAZERI.Self-Similar Mining of Time Association Rules [J].Lecture Note in Artificial Intelligence,2004,3056:86-95.
  • 5InmonWH.数据仓库[M].北京:机械工业出版社,2003..
  • 6AGRAWAL R.Mining Association Rules Between Sets of Items in Large Database [C] // Proc of the ACM SIGMOD Conference on Management of Data.USA:Washington DC,1993.
  • 7AGRAWAL R,SRIKANT R.Fast Algorithms For Mining Association Rules in Large Database [DB/OL].[1996-06].http://acm.lib.tsinghua.edu.cn.
  • 8MAFRUZ ZAMAN ASHRAFI,DAVID TANIAR,KATE SMITH.A Compress-Based Association Mining Algorithm for Large Dataset [J].Lecture Notes in Computer Science,2003,2660:978-987.
  • 9WENKE LEE,STOLFO S J,MOK K W.Adaptive Intrusion Detection:A Data Mining Approach [J].Artificial Intelligence Review,2000,14 (6):533-567.
  • 10KAMBER M,HAN J,CHANG J.Metarule-Guided Mining of Multi-Dimensional Association Rules Using Data Cubes [C]//Proc 3rd Int Conf Knowledge Discovery and Data Mining (KDD97).California:New Port Beach,1997:207-210.

共引文献14

同被引文献76

引证文献11

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部