期刊文献+

基于数据挖掘的网络入侵检测系统研究 被引量:2

The Research of the Network Intrusion Detection System Based on Data Mining
下载PDF
导出
摘要 现有入侵检测系统一般存在着自适应性差、误报、漏报问题、数据过载等问题。面基于数据挖掘的入侵检测系统智能性好,自动化程度高、检测效率高、自适应能力强,从而使入侵检测系统具有更好的自学习、自适应和自我扩展的能力。本文提出了一种基于数据挖掘的网络入侵检测系统模型。 Current intrusion detection system in general there is poor adaptability, false, omitted the issue of data overload. Surface- based data mining intrusion detection system of intelligent, highly automated, efficieut detection, adaptive ability, so that the intrusion detection system with better self-learning, adaptive and self-expansion. In this paper, a data mining-based network intrusion detection system model is introduced.
作者 胡洁 张磊
出处 《微计算机信息》 2009年第9期103-104,88,共3页 Control & Automation
关键词 网络入侵检测 数据挖掘 主机代理 管理决策 Network Intrusion Detection Data Mining Host Agent Management Decision-Making
  • 相关文献

参考文献4

二级参考文献15

  • 1高光勇,迟乐军,王艳春.联动防火墙的主机入侵检测系统的研究[J].微计算机信息,2005,21(07X):66-68. 被引量:23
  • 2LEE W.A Data mining framework for constructing feature and model for intrusion detection system[C]. Paper of the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences, columbia university. 1999.
  • 3LEE W.STOLFO S J.MOK K W.Mining in a data-flow environment: Experience in network intrusion detection[A]. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD99)[C]. August 1999.
  • 4LEE W.,STOLFO S J.Data mining approaches for intrusion detection[A]. In Proceedings of the 7th USENIX Security Symposium[C]. San Antonio, TX, January 1998.
  • 5LEE W.STOLFO S J,MOK K W.A data mining framework for building intrusion detection models[A]. In Proceedings of the 1999 IEEE Symposium on Security and Privacy[C].May 1999.
  • 6RAKESH Agrawal,RAMAKISHNAN Srikant. Fast algorithms for mining association rules[A]. :Proc the 20th International Conference on Very Large Databases[C].Santiago, Chile,1994.
  • 7RAKESH Agrawal, RAMAKISHNAN Srikant. Mining sequential patterns[R]. IBM Almaden Research Center, San Jose, California: Research Report RJ 9910, 1994.
  • 8COHEN W W. Fast effective rule induction[A]. In Machine Learning: the 12th International Conference[C].Lake Taho, CA, 1995.
  • 9VernPaxson. Bro: A system for detecting network intruders in real-time[A]. Proc of the Seventh USENIX Security Symp[C]. San Antonin, TX, January 1998.
  • 10HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..

共引文献90

同被引文献9

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部