期刊文献+

基于数据挖掘的分布式网络入侵检测系统设计及实现 被引量:9

Design and Implementation of Distributed Network Intrusion Detection System Based on Data Mining
下载PDF
导出
摘要 提出基于数据挖掘的入侵检测系统模型、改进的FP-Growth的关联分析算法和基于分箱统计的FCM网络入侵检测技术。系统实验结果表明,所开发的网络入侵检测系统可以稳定地工作在以太网络环境下,能够及时发现入侵行为,有效地解决了数据挖掘速度问题,增强了入侵检测系统的检测能力,具备了良好的网络入侵检测性能。 Data mining is applied to intrusion detection system, which puts forward a system model based on data mining, improving the FP-Growth algorithm based on associative analysis, and refining the technology of FCM network intrusion detection based on statistical binning. The experimental result shows that the network intrusion detection developed by this paper can work very stably under the Ethernet, find intrusion activities in time,solve the problem of data mining speed effectively, enhance the detective ability of intrusion detection, and possess a favorable performance of intrusion detection.
出处 《计算机科学》 CSCD 北大核心 2009年第3期103-105,共3页 Computer Science
基金 江苏省产业技术与开发基金 苏发改[2006]1106号资助
关键词 入侵检测系统 分布式 数据挖掘 Intrusion detection system, Distribution, Data mining
  • 相关文献

参考文献9

  • 1http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html. KDD Cup 1999 Data.
  • 2史志才,季振洲,胡铭曾.分布式网络入侵检测技术研究[J].计算机工程,2005,31(13):112-114. 被引量:13
  • 3Gopalakrishna R, Spafford E H. A Framework for Distributed Intrusion Detection Using Interest Driven Cooperating Agents. Department of Computer Science, Purdue University, May 2001
  • 4Fayyad U M, Piatesky-shapiro G, Smyth P. Advances in knowledge discovery and data mining. Galifornia: AAAI/MIT Press, 1996
  • 5Ramaswamy S, Rastogi R,Shim K. Efficient algorithms for mining outliers from large data sets//Proceedings of the ACM SIGMOD International Conference on Management of Data. Dallas, TX, USA, 2000:427-438
  • 6Han Jia wei,Chee S H S,Chiang J Y. Issues for On-Line Analytical Mining of Data Warehouses
  • 7Fuchsberger A. Intrusion Detection Systems and Intrusion Prevention Systems. Information Security Technical Report. 2005, 10:134-139
  • 8Kim G H, Spafford E H. Experiences with tripwire: Using integrity checkers for intrusion detection[R]. West Lafayette, USA: Purdue University,Depatment of Computer Sciences, 1994
  • 9Lee W, Stolfo S J, Chan P K, et al. Real time data mining-based intrusion detection[A]//Proceedings of 2nd DARPA Information Survivability Conference and Exposition (DISCEX)

二级参考文献8

共引文献12

同被引文献84

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部