期刊文献+

数据挖掘在网络入侵检测系统中的应用研究 被引量:2

下载PDF
导出
摘要 本文提出了一个基于数据挖掘技术的入侵检测系统,其中主要采用了时间序列模式挖掘方法——TFSE算法挖掘入侵模式。该系统实现了规则库的自动更新,极大地提高了系统的整体性能。
出处 《网络与信息》 2007年第6期40-40,共1页 Network & Information
  • 相关文献

参考文献3

二级参考文献11

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
  • 10[1]Herve D. Towards a taxonomy of intrusion detection systems. Computer Networks, 1999,31: 805~822

共引文献33

同被引文献6

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部