期刊文献+

基于数据挖掘的入侵检测系统的构建

The construction of Detection system based on data mining
下载PDF
导出
摘要 随着Internet的飞速发展,计算机网络己经在社会、经济、文化和人们的日常生活中扮演着越来越重要的角色。人们在使用计算机网络的同时,也深深的注意到网络安全的重要性。因此,研究如何快速准确的检测出网络中入侵事件的发生,就显得尤为重要和迫切。在当前入侵检测技术中,基于数据挖掘的入侵检测技术有较好的发展前景。笔者介绍了如何将数据挖掘方法更好的用于入侵检测系统中,并具体说明了一种基于数据挖掘的入侵检测系统的构建。 With the fast development of Internet, computer network has been playing more and more important role in the society, economy, culture, and people's life. While using the computer network, people are also aware of the importance of network security. So, it is urgent to study how to find the intrusion in computer network precisely and rapidly. Among the intrusion detection technologies, data mining based intrusion detection technology has good prospects. The author introduces the better use of data mining method into intrusion detection system and gives a detailed explanation of an intrusion detection system based on data mining.
作者 韩莉
出处 《山东轻工业学院学报(自然科学版)》 CAS 2008年第2期84-86,共3页 Journal of Shandong Polytechnic University
关键词 网络安全 数据挖掘 入侵检测 network security data mining intrusion detection
  • 相关文献

参考文献6

二级参考文献25

  • 1LeeW.A Data Mining Framework for Constructing Features and Models for Intrusion Detection System: [PhD thesis]. New York: Columbia University, 1999, 22-26.http://www, cs. columbia, edu/-wenke/.,.
  • 2LeeW StolfoSJ.Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio:. 1998, 6-9.http://www, cs. columbia, edu/-wenke/.,.
  • 3Han Jiawei Kamber M.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 4Wang Y H, Yan W L. Adaptive Simulated Annealing for the Optimal Design of Electromagnetic Devices [J]. Magnetics, IEEE Transactions,1996,5(3) : 1214-1217.
  • 5Redvik J. Simulated Annealing Optimization Applied to Antenna Arrays with Failed Elements[J]. Antennas and Propagation Society International Symposium, 1999,7(16) : 458-461.
  • 6Lee W. Salvato re J Sto lfo. Data Mining Approaches for Intrusion Detection . San Antonio, Texas, 1998. 26-29.
  • 7M L. Security Audit Trail Analysis Using Genetic Algorithms. Poland :1993. 329-340.
  • 8Hofmeyr S A. An Immune Logical Model of Distributed Detection and Its Application to Computer Security[M]. New Mexico:UNM Press,1999.
  • 9MICHAEL J A B, LINOFF G.Data Mining Techniques: For Marketing, Sales,and Customer Support[M].New York:Wiley, 1997.
  • 10JOSEPH P B. Data Mining with Neural Networks[M].New York:McGraw-Hill,1996.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部