期刊文献+

基于数据挖掘的网络入侵检测系统设计与实现 被引量:9

Design and implementation of network intrusion detection system based on data mining
下载PDF
导出
摘要 设计了一个基于数据挖掘技术的网络入侵检测系统模型。该模型在Snort入侵检测系统的基础上,利用数据挖掘技术增加了聚类分析模块、异常检测引擎和关联分析器。该系统不仅能够有效地检测到新的入侵行为,而且能提升检测的速度,在达到实时性要求的同时,解决了一般网络入侵检测系统对新的入侵行为无能为力的问题。 The article designs an intrusion detection system model based on data mining technique. The model based on the Snort intrusion detection system utilizes data mining technique to add clustering analysis module,anomaly detection engine and correlation analyzer. The system can not only effectively detect new invasion, but also promote detective speed. So it can solve a problem that general network detect system does nothing to new invasion as well as meet the real-time demand.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第14期134-137,共4页 Computer Engineering and Applications
基金 广州市科技型中小企业技术创新基金项目(No.2007V43C0091)
关键词 入侵检测 数据挖掘 SNORT intrusion detection data mining Snort
  • 相关文献

参考文献5

二级参考文献12

  • 1[1]Jiawei Han, Micheline Kambr. DATA MINING Concept and Technique, Morgan Kaufmann Publishers.
  • 2[2]Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection[A]. Proceedings of the 7th USENIX Security Symposium[C]. 1998.
  • 3[3]Bob Toxen, Real World Linux Security: Intrusion Prevention, Detection, and Recovery, 2000, Prentice Hall PTR.
  • 4[4]Joel Scambray, Stuart McClure, G eorge Kurtz, Network Security Secrets & Solution HACKING EXPOSED,2001, Mc Graw Hill Education.
  • 5[5]Bob Toxen, Real World Linux Security: Intrusion Prevention, Detection, and Recovery, 2000,Prentice Hall PIl.
  • 6[6]Ningning Wu, Audit data analysis and mining , George Mason University, PQDD.
  • 7[8]http://www.dmgroup.org.cn/.
  • 8Lee W. A Data Mining Framework for Constructing Feature and Model for Intrusion Detection System [Paper of the Degree of Doctor of Philosophy in the Graduate School of Arts and Sciences]. Columbia University, 1999
  • 9Forrest S,Hofmeyr S A,Somauaji A.A Sense of Self for Unix Processes. Los Alamitos,CA:Proc of the 1996 IEEE Symp.on Security and Privacy, IEEE Computer Society Press, 1996:120-128
  • 10Rakesh A,Ramakishnan S.Mining Sequential Patterns. IBM Almaden Research Center, San Jose, California: Research Report RJ 9910, 1994

共引文献12

同被引文献61

引证文献9

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部