期刊文献+

数据挖掘技术在入侵检测中的应用

Application of Data Mining Technology in Intrusion Detection
下载PDF
导出
摘要 阐述了入侵检测和数据挖掘技术,并介绍了数据挖掘技术在入侵检测系统中的应用。 This article elaborates the intrusion detection and data mining technology and introduces the application of data mining technology in intrusion detection.
出处 《机械管理开发》 2007年第6期135-136,138,共3页 Mechanical Management and Development
关键词 入侵检测 数据挖掘 技术应用 Intrusion detection Data mining Technical application
  • 相关文献

参考文献2

二级参考文献15

  • 1[1]Jian P,Shambhu J U,Faisal F,Venugopal G.Data Mining for Intrusion Detection: Techniques,Applications and Systems [C].Proceedings of the 20th International Conference on Data Engineering (ICDE'04).2004.
  • 2[2]Agrawal R.Fast algorithms for mining association rules[C].Proc the 20th International Conference on Very Large Database.Santiago de Chile,1994: 478~499.
  • 3[3]Florez G,Susan B,Rayford V,An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection[C].Proceedings of the North American Fuzzy Information Processing Society Conference (NAFIPS 2002),New Orleans,LA,June 27-29,2002.
  • 4[4]Park J S,Chen M S,Yu P S.An Effective hash-based algorithm for mining association rules[C].Proc ACM SIGMOD Int Conf Management of Data,San Jose,CA,1995: 175~186.
  • 5[5]Chen M S.Data mining: An overview from a database perspective[J].IEEE Trans Knowledge and Data Engineering,1997,8(6): 866-883.
  • 6[6]Mannila H,Toivonen H.Discovering generalized episodes using minimal occurrences[C].In Proceedings of the 2nd International Conference on Knowledge Discovery in Databases and Data Mining,Portland,Oregon,1996.
  • 7包家庆.IDS五大发展趋势[J].网络世界,2002,10(39).
  • 8胡建斌.入侵检测技术[EB/OL].http://infosec.pku.edu.cn/~hjbin.
  • 9ISS.Network-Vs.Host-based Intrusion Detection[S].1998.
  • 10Lee W.A data mining framework for constructing features and models for intrusion detection system [C].New York:Columbia University, 1999,22-26. http://ww. cs.columbia.edu/~wenke/.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部