期刊文献+

基于数据挖掘技术的Snort检测系统模型

A System Model of Snort Detection Based on Data Mining Technonlogy
下载PDF
导出
摘要 针对网络入侵检测系统Snort的不足,提出了一种基于数据挖掘技术的二次检测系统模型。该模型以Snort系统为基础,增加了异常检测挖掘模块、新规则形成模块、二次检验模块等,可以实现实时更新入侵行为规则库,提高系统的检测速度以及大幅地减低Snort系统的漏报率与误报率。 Because of Snort system having disadvantage,a system model of Snort quadratic detection based on data mining technonlogy is put forward.The model which is based upon Snort system adds mining model of exceptional detection,forming model of new regulation and quadratic detection model and so on.Therefore the system is able to update regulation database of invading behavior in real time.Moreover,detective velocity is improved and leaking and distort ratio are largely diminished.
作者 郎振红
出处 《天津职业院校联合学报》 2010年第2期49-52,共4页 Journal of Tianjin Vocational Institutes
关键词 数据挖掘 SNORT系统 入侵检测 data mining Snort system intrusion detection
  • 相关文献

参考文献4

二级参考文献11

  • 1[1]Jiawei Han, Micheline Kambr. DATA MINING Concept and Technique, Morgan Kaufmann Publishers.
  • 2[2]Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection[A]. Proceedings of the 7th USENIX Security Symposium[C]. 1998.
  • 3[3]Bob Toxen, Real World Linux Security: Intrusion Prevention, Detection, and Recovery, 2000, Prentice Hall PTR.
  • 4[4]Joel Scambray, Stuart McClure, G eorge Kurtz, Network Security Secrets & Solution HACKING EXPOSED,2001, Mc Graw Hill Education.
  • 5[5]Bob Toxen, Real World Linux Security: Intrusion Prevention, Detection, and Recovery, 2000,Prentice Hall PIl.
  • 6[6]Ningning Wu, Audit data analysis and mining , George Mason University, PQDD.
  • 7[8]http://www.dmgroup.org.cn/.
  • 8连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:85
  • 9卢勇,曹阳,凌军,李莉.基于数据挖掘的入侵检测系统框架[J].武汉大学学报(理学版),2002,48(1):63-66. 被引量:21
  • 10朱玉全,孙志挥,季小俊.基于频繁模式树的关联规则增量式更新算法[J].计算机学报,2003,26(1):91-96. 被引量:80

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部