期刊文献+

用户行为异常检测在安全审计系统中的应用 被引量:13

Application of users' abnormal behavior detection in security auditing system
下载PDF
导出
摘要 提出一种基于数据挖掘的用户行为审计方法,通过对正常审计数据进行分类预处理获取其他传统方法容易遗漏的正常模式,结合使用关联规则以及序列模式挖掘技术对用户行为进行模式挖掘,根据模式相似度比较来检测用户行为的异常。将此方法应用于实际的安全审计系统,得到了较好的效果。 A method for auditing users' abnormal behavior based on data mining technology was proposed. Through preprocessing normal auditing data, some additional normal patterns were found. Then, users' behavior profiles were discovered with association rules and sequence pattern mining methods. Users' behavior could be further audited with these profiles. Simulation results show that this method is valid in real security auditing systems.
出处 《计算机应用》 CSCD 北大核心 2006年第7期1637-1639,1642,共4页 journal of Computer Applications
基金 重庆市自然科学基金重点项目(2005BA2003) 重庆市信息产业发展资金资助项目(200401022) 重庆市优秀中青年骨干教师资助计划
关键词 安全审计 用户行为模式 数据挖掘 关联规则 序列模式 security auditing users' behavior profile data mining association rule sequence pattern
  • 相关文献

参考文献11

二级参考文献31

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883
  • 8[1]Han J W, Kamber M. Data mining concepts and techniques[M]. Beijing:China Machine Press, 2001.
  • 9[2]Lee W, Stolfo S J, Mok K W. Algorithms for mining system audit data[M]. Data Retrieval and Data Mining. Dordrecht: Kluwer Academic Publishers, 1999.
  • 10[3]Lee W, Stolfo S J. Data mining approach for intrusion detection[C]. Proceedings of the 7th USENIX Security Symposium, San Antonio, 1998.

共引文献322

同被引文献88

引证文献13

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部