期刊文献+

基于图和信息熵的入侵检测分类器构造 被引量:1

A Construction Method of Intrusion Detection Classifier Based on Graph and Information Entropy
下载PDF
导出
摘要 针对传统的Snort入侵检测引擎所使用二维表逐一比较效率低下的问题,该文采用基于图的数据挖掘技术挖掘规则、运用改进后的信息熵方法选择分类属性,构造入侵检测分类器。通过实验证明,该方法是有效可行的。 In order to solve the question of traditional Snort intrusion detection engine used the two-dimensional table matching inefficient one by one, the paper applies graph-based data mining technology , uses improved information entropy methods to choose the classification attributes, thus eonstruct a intrusion detection classifier. The experiment results show that the method is feasible and effective.
作者 吴川 姜淑娟
出处 《微计算机信息》 北大核心 2008年第30期62-64,共3页 Control & Automation
基金 国家自然科学基金青年基金资助(60503020)
关键词 数据挖掘 信息熵 入侵检测 分类 graph data mining information entropy intrusion dection classficalion
  • 相关文献

参考文献4

  • 1A.Inokuchi,T.Washio,and H.Motoda,Complete mining of frequent patterns from graphs:Mining graph data,Machine Learning,vol.50, no.3.321-354.2003.
  • 2Ruggieri S. Efficient C4.5. IEEE Transactions on Knowledge and Data Engineering,2002, 14(2):438-444
  • 3曲海鹏.入侵检测系统测试评估,http://www.is.iscas.ac.cn/students/quhaipeng/.
  • 4董小国,丁冉.IDS自适应特征选择算法——进化包装(Wrapper)算法分析[J].微计算机信息,2006,22(11X):46-48. 被引量:2

二级参考文献8

  • 1R. P. Lippmann, D. 1.Fried, 1. Graf.1. W. Haines. K. R.Kendall. D. McClung, D. Weber, S. E. Webster, D. Wyschogrod.R. K. Cun. Ningham and M. A. Zissman, "Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation," in Pmc. Of the 20W DARPA Infoomurtion Suwiwbiliry Confound Erposition (DISCEX), Hilton Head, vol.2 IEEE press,2000.pp. 12-26.
  • 2C. M. Bishop, Neural Networks for Pattem Recognition. Clarendon Press. Oxford. 1995.
  • 3S. Haykin, Neural Networks -A Comprehensive Foundation.Macmillan College Publishing Company, New York, 1994
  • 4M.Klimek and B. Sick, "Architecture optimization of radial basis function networks with a combination of hard-and soft-computing techniques," in SMC 2003: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics, Washington, 2003.
  • 5W.R Stevens, TCP/IP Illustrated, Volume I, 1st Ed. Addison Wesley Longman, 1998.
  • 6S.Axelsson, "Intrusion detection systems: A survey and taxonomy," Department of Computer engineering, Chalmers University of Technology, Goteborg, Tech. Rep, 99-15, 2000.
  • 7文绍纯,罗飞,付连续,莫鸿强.“遗传算法介绍”,华南理工大学电子与信息学院,广州,510640 2003—04—20
  • 8R. Dum5 T. Champion. B. Witten. E. Miller. And L. Spagnuolo."Testing and evaluating computer intrusion detection systems:"Communication of the ACM, vol. 42, pp. 53-61. 1999.

共引文献1

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部