期刊文献+

一种基于关联规则的分布式入侵检测模型 被引量:2

A Model of Distributed Intrusion Detection Based on Association Rules
下载PDF
导出
摘要 高虚警率和漏警率是当前入侵检测系统(IDS)的主要问题。采用基于CBW关联规则的数据挖掘算法,提出了一种新的分布式入侵检测模型,并分析了各模块的具体功能与实现。经实验分析,本模型可以有效降低虚警率和漏警率,同时在一定程度上实现各分节点间的快速协作检测能力。 High rate of false alarms and missing alarms are the primary problem in current intrusion detection system (IDS). In this paper, a new model of distributed intrusion detection is proposed,which is based on CBW association rules algorithm to mine new rules and intrusion event, and the function and implement of each module is analyzed. The experiment result showed that this model could decrease false alarms rate and missed alarms rate effectually, this model could also improve detection speed and realize the cooperation among each code.
出处 《微处理机》 2008年第1期103-106,共4页 Microprocessors
基金 国家自然科学基金资助项目(60373088)
关键词 入侵检测 数据挖掘 关联规则 Intrusion detection Data mining Association rules
  • 相关文献

参考文献9

  • 1Jiawei Han, Micheline Kambr. Data mining: Concepts and techniques [ M ]. Morgan Kaufmann Publishers, 2001 : 10 -11.
  • 2Kannadiga, P. Zulkernine, M. DIDMA : a distributed intrusion detection system using mobile agents [ J ]. Software Engineering ,2005,25 ( 23 ) :238 - 245.
  • 3Ke Wang, Yu He, Jiawei Han. Pushing support constraints into association rules mining [ J ]. IEEE Transaction on Knowledge and Data Engineering, 2003, 15 ( 3 ) : 642 - 658.
  • 4Yoshida, K. Entropy based intrusion detection [ J ]. IEEE on Communications, Computers and signal Processing, 2003,28 (2) : 840 - 843.
  • 5Ja - Hwung Su, Wen - Yang Lin. CBW: An Efficient Algorithm for Frequent Itemset Mining [ J ]. System Sciences, Proceedings of the 37th Annual Hawaii International Conference. 2004,5 ( 1 ) :9 - 18.
  • 6朱秋萍,毛平平,罗俊.基于关联规则的入侵检测系统[J].计算机工程与应用,2004,40(26):160-162. 被引量:7
  • 7韩宗芬,刘科,金海,郭立.基于数据挖掘的分布式协同入侵检测[J].华中科技大学学报(自然科学版),2002,30(7):33-35. 被引量:9
  • 8罗宁,喻莉.入侵检测技术研究发展[J].计算机与数字工程,2005,33(6):52-57. 被引量:5
  • 9董晓梅,于戈.分布式入侵检测与响应协作模型研究[J].计算机工程,2006,32(6):151-153. 被引量:11

二级参考文献37

  • 1R Agrawal,T Imielinski,A Swami. Mining Association Rules Between Sets of Items in Large Databases[C].In:Proceedings of the ACM SIGMOD Conference on Management of data,Downloaded from http://www.cs.brandeis.edu/~cs227b/papers/decision-dataminingoverviewsigmod93.pdf, 1993: 207 ~216
  • 2R Agrawal. Ramakrishnan Srikant. Fast Algorithms for Mining Association Rules. IBM Almaden Research Center, 1996
  • 3S Brin,R Motwani,C Silverstein. Beyond market baskets:generlizing association rules to correlations[C].In:Proceedings of the ACM SIGMOD, 1996: 255~276
  • 4Buchanan B G,Mitchell T.Model-directed Learning of Production Rules. Waterman D A,Hayes-Roth F eds.Pattern Directed Inference Systems,Academic Press, 1978:297~312
  • 5T. Lunt. Detecting Intruders in Computer Systems. In:Proceedings of the 1993 Conference on Auditing and Computer Technology.
  • 6Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, and Alfonso Valdes. Detecting unusual program behavior using the statistical component of the next - generation intrusion detection system (NIDES). Technical Report SRI - CSL- 95 - 06,1995.
  • 7Herve Debar, Monique Becket, and Didier Siboni. A neural network component for an intrusion detection system. In:Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992:240 -250.
  • 8Cheri Dowd and Paul Ramstedt. The computer watch data reduction tool. In: Proceedings of the 13th National Computer Security Conference, 1990: 99 - 108.
  • 9Ian Goldberg, David Wagner, Randi Thomans, and Eric Brewer. A secure environment for untmsted helper applications(confining the wily hacker). In: Proceedings of the Sixth USENIX UNIX Security Symposium, 1996.
  • 10G. Fink and K. Levitt. Property'- based testing of privileged programs. In: Proceedings of the 10th Annual Computer Security Applications Conference, December 5 - 9 1994:154 - 163.

共引文献28

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部