期刊文献+

入侵检测系统中关联规则的挖掘

The Data Mining Of Association Rules in the Intrusion Detection System
下载PDF
导出
摘要 在分析几种现有关联规则算法的基础上,针对网络数据的具体情况,引入关键属性、参考属性以及属性相对支持度的约束,对关联规则挖掘算法FP_Growth进行了扩展,解决了基本关联规则挖掘算法中产生大量无用模式的问题,从而帮助系统发掘出更有意义的模式,提高了系统挖掘的执行效率和规则库的准确度. This paper solves the problem that there is abundant useless modes produced by basic association rules mining, which involves the key attributes, referenced attributes and the restriction of attributes' relative support. It extends the algorithm of association rules according to the specific condition of the network data. This extension has assisted the system mine more meaningful patterns and raised the execution efficiency and accuracy of rules sets.
出处 《湖北工业大学学报》 2006年第3期215-218,共4页 Journal of Hubei University of Technology
关键词 入侵检测 关联规则 FP_GROWTH算法 intrusion detection, association rules FP_growth algorithm
  • 相关文献

参考文献5

二级参考文献12

  • 1[1]Wenke Lee,Salvatore J Stolfo,Kui W Mok. A Data Mining Framework for Building Intrusion Detection Models[C].In:Proceedings of the 1999 IEEE Symposium on,1999:120~132
  • 2[2]Stephe Kent. On the trail of Intrusion into Information Systems[J].IEEE Spectrum,2000
  • 3[3]Nong Ye,Xiangyang Li,Qiang Chen. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data[J].Man and Cybernetics,Part A ,IEEE Transactions on,2001:31 (4) :266~274
  • 4[4]W W Cohen. Fast effective rule induction In Machine Learning[C].In: the 12th International Conference, Lake Taho,CA, 1997
  • 5[5]Mauro Cesar Bernardes,Edson dos Santos Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In :Software Engineering for Parallel and Distributed Systems,2000 Proceedings International Symposium on, 2000
  • 6Yun QX, Huang GQ, Wang ZQ. Genetic Algorithm and Genetic Programming. Beijing: Publishing House of Metallurgy Industry,1997 (in Chinese).
  • 7Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix process. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996.
  • 8Hofmeyr SA, Forrest S. Architecture for an artificial immune system. Evolutionary Computation Journal, 2000,8(4):443-473.
  • 9Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Proceedings of the1999 IEEE Symposium on Security and Privacy. 1999.
  • 10Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium. 1998.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部