期刊文献+

入侵检测系统中关联规则的挖掘与过滤

The Mining and Filtering of Association Rules in Intrusion Detection Systems
下载PDF
导出
摘要 在利用关联规则算法的入侵检测系统中,由频繁集生成关联规则时,关联规则可能会出现大量无意义的规则,若将这些规则用于检测,则可能会产生误导。为了获得有用的关联规则,本文对关联规则算法提出了一些改进。并运用提出的方法做了一个关联规则挖掘实验,实验结果表明挖掘得到的关联规则远远少于原算法挖掘得到的规则,并且规则易于理解,比较适合于入侵检测。 This paper discusses an intrusion detection approach based on association rules and focuses on how to optimize the association algorithm. Some mining experiments about the association rules show that the optimization of algorithm is successful and the intrusion detection system based on association rules are effective. Moreover, the association rules mined by using of proposed method are easy to understand and suitable to detect intrusion.
出处 《微计算机信息》 2010年第18期80-82,共3页 Control & Automation
基金 校博士启动基金项目(42413621V)
关键词 入侵检测 数据挖掘 关联规则 intrusion detection association rule data mining
  • 相关文献

参考文献3

二级参考文献8

  • 1[1]Jiawei Han, Micheline Kambr. DATA MINING Concept and Technique, Morgan Kaufmann Publishers.
  • 2[2]Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection[A]. Proceedings of the 7th USENIX Security Symposium[C]. 1998.
  • 3[3]Bob Toxen, Real World Linux Security: Intrusion Prevention, Detection, and Recovery, 2000, Prentice Hall PTR.
  • 4[4]Joel Scambray, Stuart McClure, G eorge Kurtz, Network Security Secrets & Solution HACKING EXPOSED,2001, Mc Graw Hill Education.
  • 5[5]Bob Toxen, Real World Linux Security: Intrusion Prevention, Detection, and Recovery, 2000,Prentice Hall PIl.
  • 6[6]Ningning Wu, Audit data analysis and mining , George Mason University, PQDD.
  • 7[8]http://www.dmgroup.org.cn/.
  • 8卢勇,曹阳,凌军,李莉.基于数据挖掘的入侵检测系统框架[J].武汉大学学报(理学版),2002,48(1):63-66. 被引量:21

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部