期刊文献+

数据挖掘技术在入侵检测系统中的应用

Application of Data Mining Technique in Intrusion Detection System
下载PDF
导出
摘要 将入侵检测系统中的攻击程度进行分类,并利用数据挖掘技术在入侵检测系统中加以应用。尽管入侵检测系统能够对攻击行为进行检测,但其结果还是具有不确定性的,利用这种划分能够对攻击行为的不确定性进行描述,也可以让用户对入侵行为进行灵活的调整。 In this paper we classify the attack degree in IDS, and use it in IDS by data mining. Though IDS can detect the attack activities in network,the result is uncertain. So we classify the degree of the attack activities, and users can adjust the detection according to the actual situation.
作者 高峰 姚艳秋
出处 《长春师范学院学报(自然科学版)》 2006年第5期41-44,共4页 Journal of Changchun Teachers College
关键词 数据挖掘 入侵检测系统 不确定性 data mining intrusion detection system uncertainty
  • 相关文献

参考文献6

  • 1[3]Noel,S.,Wijesekera,D.,and Youman,C.Modern intrusion detection,datamining,and degrees of attack guilt[J].Applications of Data Miningin Computer Security,edited by D.Barbar'a and S.Jajodia,Kluwer Academic Publishers,2002.
  • 2[4]Klaus Julish.Data mining for intrusion detection:a critical review[R].Switzerland:IBM Research,Zurich Research Laboratory,2001.
  • 3[5]Daniel Barbara,NingningWu,and Sushil Jajodia.Detecting novel network intrusions using bayes estimators[J].In Proceedings of First SIAM Conference on Data Mining,Chicago,IL,2001.
  • 4[6]Eskin,E.,Arnold,A.,Portnoy,L.,and Stolfo,S.A Geometric Framework for Unsupervised Anomaly Detection:Detecting Intrusions in Unlabeled Data[Z].http://www.cs.columbia.edu/~eeskin/.
  • 5[7]Dain O,Cunningham R.F using a heterogeneous alert stream into scenarios[J].In:Proc.of the 2001 ACM Workshop on Data Mining for Security Applications,2001.1-13.
  • 6[8]Using MIB Ⅱ Variables For Network Anomaly Detection-A Feasibility Study,Xinzhou Qin et.al.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部