期刊文献+

基于数据挖掘的入侵检测技术研究

Study of Intrusion Detection System Based on Data Mining Technology
下载PDF
导出
摘要 本文介绍了数据挖掘技术在入侵检测领域的应用,介绍了数据挖掘的常用算法,并在此基础上给出了一个基于数据挖掘的入侵检测模型。 The article introduce the application of the data mining technology in intrusion detection system and usual algorithm of data mining technology. Based on the theory of data mining and intrusion detection, a model is presented in this paper.
作者 杨臻 YANG Zhen (Zhengzhou Teachers College,Zhengzhou 450044,China)
出处 《电脑知识与技术》 2007年第9期1399-1400,共2页 Computer Knowledge and Technology
关键词 入侵检测 数据挖掘 数据挖掘算法 intrusion detection data mining data mining algorithm
  • 相关文献

参考文献2

二级参考文献6

  • 1Wenke Lee, SalbatoreJ. Stolfo, Kui W. Mok. Adaptive Intrusion Detion: A Data Mining Approach. Artificial Intelligence Review,2000 (14): 533-567.
  • 2Agrawal R,Srikant R.Fast algorithms for mining association rules in large database[R].In Research Report RJ 9839,San Jose,CA:IBM Almaden Research Center,1994.
  • 3Agrawal R,Imielinski T,Swami A.Mining association rules between sets of items in large databases[A].Proceedings of the ACM SIGMOD Conference on Management of data[C].[s.l.]:[s.n.],1993.207-216.
  • 4Cohem W W.Fast Effective Rule Induction[A].In Proceedings of the Twelfth International Conference on Machine Learning (ICML-95)[C].Lake Tahoe,CA:Morgan Kaufman,1995.115-123.
  • 5Lee W.A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems[D].New York:Columbia University,1999.
  • 6Lee W,Stolfo S J.A Framework for Constructing Features and Models for Intrusion Detection Systems[J].ACM Trans on Inform and System Security,2000,3(4):227 -261.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部