期刊文献+

基于聚类挖掘的入侵检测方法的研究 被引量:2

ON CLUSTERING MINING-BASED INTRUSION DETECTION METHOD
下载PDF
导出
摘要 提出一种新的基于聚类挖掘的入侵检测方法。通过将入侵检测方法中的协议分析技术应用于数据清洗中,使得聚类数据挖掘理论与入侵检测实践更加贴近。此外,它还对聚类数据挖掘中的一些经典算法进行了扩展,以增强入侵检测的决策分析的能力。 A new clustering mining-based intrusion detection method is suggested.Protocol analysis technique in intrusion detection method is suggested to be attached to the data washing,which makes the hypothesis of clustering data mining technique much closer to the practices of intrusion detection.In addition,some classical algorithms of the clustering data mining are expanded in this new method to enhance the ability of decision-making and analysis on intrusion detection.
出处 《计算机应用与软件》 CSCD 2010年第4期133-136,共4页 Computer Applications and Software
基金 广东省科技计划项目(2006B15401002)
关键词 入侵检测 数据挖掘 聚类 协议分析 Intrusion detection Data mining Clustering Protocol analysis
  • 相关文献

参考文献5

二级参考文献16

  • 1Eskin E. Anomaly detection over noisy data using learned probability distributions[C]. In: Proceedings of the Seventeenth International Conference on Machine Learning (ICML-2000),2000,June 29-July 02,255-262.
  • 2Portnoy L, Eskin E, Stolfo S J. Intrusion detection with unlabeled data using clustering[C]. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001).Philadelphia, PA: November 5-8, 2001.
  • 3Eskin E, Arnold A, Prerau M et al. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data[A]. In:Data Mining for Security Applications[M],Kluwer, 2002.
  • 4Lee W K, Stolfo S J, Mok K W. Mining in a data-flow environment: experience in network intrusion detection[C]. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD-99), August 1999.
  • 5Li Xiang-yang. Clustering and classification algorithm for computer intrusion detection[D]. Arizona State University,2001.
  • 6Charles Elkan. Results of the KDD'99 classifier learning contest[EB/OL]. URL: http://www. cs. ucsd. edu/users/elkan/clresults. html.
  • 7Merz C J, Merphy P. UCI repository of machine learning databases [EB/OL]. URL: http://www. ics. uci. edu/mlearn/MLRRepository. html.
  • 8HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 9DENNING DE. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987, SE-13:222 -232.
  • 10PORTNOY L, ESKIN E, STOLFO S. Intrusion detection with unlabeled data using clustering[A]. Proceedings of ACM CSS Workshop on Data Mining Applied to Security[ C].2001.

共引文献81

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部