期刊文献+

一种MANET入侵检测系统模型研究

Research of One Intrusion Detection Model for Mobile Ad-hoc Networks
下载PDF
导出
摘要 用模糊集概念统计min-sup和minconf,并加入了第三约束要素:兴趣度,使min-sup和minconf通过数据信息本身的特性计算得到,规则可信度更高,避免了这两个值设置过高会异常漏检,设置过低无法检测异常的问题。根据这种思想设计了一种新的移动自组织网络入侵检测模型,把这个模型在网络仿真软件中对基于主机的数据进行了挖掘分析,用AODV协议实现了对模型的3种典型攻击。实验结果表明该模型对这些攻击的检测率平均达到90%以上。 The statistic of min- sup and minconf can be done by fuzzy set concept, at the same time the third key factor of confidence can be considered into it and min- sup and minconf can be gained by information characteristic itself. By this way, it avoids either the possibility of missing detection caused by too high value of min- sup and minconf or the possible disability to detect abnormality caused by too low value of the two variables. A new model of mobile self- constructed network intrusion checking was designed according to the thinking poimed above. The model was used in network- imitate software to do data mining based on the data of host computer. Furthermore, finished the testing of 3 representative attacks aimed to the model. The experiment results show that the average detection ratio of the model to these intrusion reached above 90 % .
作者 何利 谢中
出处 《计算机技术与发展》 2008年第7期135-138,共4页 Computer Technology and Development
基金 重庆市教育科研资助项目(040503)
关键词 数据挖掘 MANET 入侵检测 data mining mobile ad- hoc networks intrusion detection
  • 相关文献

参考文献16

  • 1Ichlamtac,Mconti. Mobile Ad hoe Networking: Imperatives and Challenges[ J ]. Ad hoc Networks, 2003,1(1) : 13 - 64.
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 3Agrawal R, Imielinski T,Swanmi A. Mining Association Rules Between Sets of Items in Large Database[C]//Proc. of ACM - SIGMOD on Management of Data. Washington D. C: [ s. n. ]. 1993:206 - 207.
  • 4Agrawal R,Srikant R. Fast Algorithms for Mining Association Rules[ C]//Proc. of VLDB. Santiago, Chile: [ s. n. ]. 1994: 487 - 499.
  • 5Han J, Cai Y, Cercone N. Data - driven Discovery of Quantitative Rules in Relational Databases[J ]. IEEE Transaction on Knowledge and Data Engineering, 1993,5(1) :29 - 40.
  • 6Agrawal R,Omiecinski E,Navathe S. An Efficient Algorithm for Mining Association Rules in Large Databases[C]//the 21 st VLDB Conference. Zurich, Switzerland: [ s. n. ]. 1995.
  • 7Inmon W H. The Operational Data Store[M]. New York: John Wiley & SonsInc,1996.
  • 8Au Wai- Ho,Chan K C C. FARM:a data mining system for discovering fuzzy association rules[ C]//The 1999 IEEE International Fuzzy Systems Conference. FUZZ - IEEE 99. Seoul,South Korea: [ s. n. ] ,1999:1217- 1222.
  • 9Orchard R. Fuzzy reasoning in jess: the fuzzy J toolkit and fuzzy jess[C]//Proceedings of ICEIS 2001,3rd International Conference on Enterprise Information Systems. Setubal, Portugal: [s. n. ] ,2001:533 - 542.
  • 10朱天清,熊平.模糊关联规则挖掘及其算法研究[J].武汉工业学院学报,2005,24(1):24-28. 被引量:9

二级参考文献50

  • 1朱天清,王先培,熊平.IDS中的模糊关联规则挖掘与响应[J].计算机工程与应用,2004,40(15):148-150. 被引量:7
  • 2JiaWeiHan.Date Mining concepts and techniques[M].北京: 机械工业出版社,2001..
  • 3Kuok C, Fu A, Wong M. Mining Fuzzy Association Rules in Databases[J]. SIGMOD Record, 1998,17(1): 41-46.
  • 4LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 5LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 6KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 7LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 8An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 9ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 10The open source network intrusion detection system [EB/OL]. http://www.snort.org/.

共引文献275

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部