期刊文献+

入侵检测系统中的智能化方法 被引量:1

Intelligent Method in Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统很好地弥补了访问控制、身份认证等传统机制所不能解决的问题。目前的入侵检测技术正处在第一代技术向下一代技术的过渡时期,未来的入侵检测研究需要融合其他学科和技术领域的知识,充分利用许多成熟的信息智能处理技术。文中讨论和研究了三种典型的智能检测技术,其中对统计学方法、专家系统进行了总体概述,重点阐述数据挖掘技术中的关联规则分析、序列模式分析和数据分类分析的工作原理。 Intrusion detection system, as a supplement of traditional access control and identity authentication, provides critical protections from potential attempts to exploit computer resource vulnerabilities. Intrusion detection is going to the next generation and will combine methods from other fields, exploiting many mature information technology and artificial intelligence, such as statistics method, expert system, neural network, agent and data mining etc. in the future. In this paper, discuss three kinds of typical intellectual detection technologies. And statistics method, expert system are comparatively briefly introduced. The association rule analysis, sequence patterns analysis and data classification analysis of data mining technology are emphatically illustrated.
出处 《计算机技术与发展》 2006年第6期132-135,共4页 Computer Technology and Development
基金 江苏省自然科学基金资助项目(BK2005146) 江苏省高技术研究计划(BG2004004) 江苏省计算机信息处理技术重点实验室基金(kjs050001)
关键词 入侵检测 智能方法 数据挖掘 统计学 专家系统 intrusion detection intelligent method data mining statistics expert system
  • 相关文献

参考文献7

二级参考文献18

  • 1[1]Wenke L, Salvatore S . Data Mining Approaches for lnrusion Detection. URL: http://www.cs.columbiaedu/~wenke/papers/usenix/ usenix.html, 2000-10-12
  • 2[2]Network Flight Recorder Inc.Network Flight Recorder http://www.nfr com
  • 3[3]Fayyad U , Piatetsky-Shapiro G , Smyth P . From Data Mining to Knowledge Discovery: An Overview. In Fayyad U . PiatetskyShapiro G , Smyth P, and Uthurusamy R, Editors, Adyances in Knowledge Discovery and Data Mining , AAAI/MIT Press,Cambridge, MA, 1996
  • 4[4]Lunt T. Detecting Intruders in Computer Systems. Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993
  • 5[2]Mukherjee B, Herberlein L, Levitt K. Network intrusion detection[C]. IEEE Network,1994.
  • 6[3]Strunk S. Intrusion Detection FAQ[C]. SANS Institute Resources, 1999.
  • 7[1]ICSA.Intrusion Detection Systems Buyer's Guide.http://www.icsa.net
  • 8[2]Roesch M.Snort-Lightweight Intrusion Detection for Networks.http://www.snort.org
  • 9[3]Jacobson V,Leres C,McCanne S.Packet Capturing Library. Lawrence Berkeley National Laboratory, http://www-nrg.ee.lbl.gov
  • 10[4]Jacobson V,Leres C,McCanne S.Tcpdump. Lawrence Berkeley National Laboratory.http://www-nrg.ee.lbl.gov,1991

共引文献54

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部