期刊文献+

基于数据挖掘技术的网络入侵检测系统设计

Design of the Network Intrusion Detection System Based on Data Mining
下载PDF
导出
摘要 随着互联网的迅速发展,许多新的技术被引入到信息安全领域。在基于数据挖掘的入侵检测系统中,系统构造是一个关键环节。本文介绍了基于数据挖掘的入侵检测系统的设计方案,把数据挖掘技术引入到入侵检测系统中。 With the high speed development of Internet, a lot of new technology is introduced into information security field.In the realization of data mining-based intrusion detection system,feature construction is a key process. The paper introduces the design of the intrusion detection system based on data mining.
作者 宋继军
出处 《科技广场》 2010年第8期54-56,共3页 Science Mosaic
关键词 入侵检测 数据挖掘 系统设计 Intrusion Detection Data Mining System Design
  • 相关文献

参考文献5

二级参考文献13

  • 1于秀林 任雪松.多元统计分析[M].中国统计出版社,1997..
  • 2王国胤.Rough集理论与知识获取[M].,2000-09..
  • 3Edward G Amoroso.Fundaments of Computer Security Technology[M]. Upper Saddle River,NJ:Prentice-Hall PTR,1994.
  • 4S J Stolfo,A L Prodromidis,S Tselepis et al.JAM:Java agents for metalearning over distributed databases[C].In:Proceedings of the 3^rd International Conference on Knowledge Discovery and Data Mining,Newport Beach ,CA ,AAAI Press, 1997:74-81.
  • 5P K Chan,S J Stolfo.Toward parallel and distributed learning by metalearning[C].In:AAAI Workshop in Knowledge Discovery in Databases, 1993 : 227-240.
  • 6W LEE,S J Stolfo,K W Mok.Mining in a data_flow environment:Experience in intrusion detection[M].submitted for publication, 1999.
  • 7R Agrawal,T Imielinski,A Swami.Mining association rules between sets of items in large databases[C].In:Proceedings of the ACM SIG--MOD Conference on Management of Data,1993:227-240.
  • 8Wenke Lee,Salvatore J Stolfo,Kui W Mok.A Data Mining Frarnework for Building Intrusion Detection Models.1999.
  • 9Eleazar Eskin,Matthew Miller,Zhi-Da Zhong et al.Adaptive Model Generation for Intrusion Detection Systems.
  • 10Yang Y,IEEE Intelligent System,1999年,14卷,4期,32页

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部