期刊文献+

数据挖掘技术在入侵检测系统中的应用研究 被引量:11

Research for Data Mining in Intrusion Detection System
下载PDF
导出
摘要 随着以太网的快速发展,基于网络的攻击方式越来越多,传统的入侵检测系统越来越难以应付;将数据挖掘技术引入到入侵检测系统中来,分析网络中各种行为记录中潜在的攻击信息,自动辨别出网络入侵的模式,从而提高系统的检测效率;将K-MEANS算法及DBSCAN算法相综合,应用到入侵检测系统,并针对K-MEANS算法的一些不足进行了改进,提出了通过信息嫡理论的使用解决K-MEANS算法选择初始簇中心问题,然后利用其分类结果完善DBSCAN算法两个关键参数(Eps,Minpts)的设置,通过DB-SCAN算法,进一步地分析可疑的异常聚类,提高聚类的准确度。 With the rapid development of Ethernet,network-based attacks more and more,traditional intrusion detection systems become increasingly difficult to cope.This article introduces data mining techniques to intrusion detection system to automatically analyze the network behavior in a variety of potential attacks recorded information,identify network intrusion model,thus improving the detection efficiency.In the data mining algorithm,this paper,the current most widely used algorithms DBSCAN and K-MEANS,and the K-MEANS algorithm is improved,the K-MEANS algorithm and DBSCAN algorithm integration is applied to the intrusion detection system.Universal Detection record set by the anomaly detection experiment show that the design of intrusion detection algorithm has a very high efficiency and accuracy.
作者 王祥斌
出处 《计算机测量与控制》 CSCD 北大核心 2012年第2期321-323,348,共4页 Computer Measurement &Control
关键词 数据挖掘技术 网络异常流量 K-MEANS改进 data mining network anomaly flow K-MEANS Improvement
  • 相关文献

参考文献4

二级参考文献36

  • 1胡尊美,王文国.DDoS攻击技术发展研究[J].网络安全技术与应用,2005(6):24-25. 被引量:5
  • 2赵卫伟.数据分类及其实现[D].南京:南京解放军理工大学,2003.
  • 3王建会,胡运发..基于互依赖的属性选择算法..复旦大学 No.021011399,,2002..
  • 4[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 5[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 6[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 7[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 8[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 9[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 10[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883

共引文献132

同被引文献61

  • 1赖苏,熊忠阳,江帆,唐蓉君.利用改进的多项式核函数支持向量机进行文本分类[J].重庆大学学报(自然科学版),2012,35(S1):41-45. 被引量:2
  • 2马占欣,王新社,黄维通,陆玉昌.对最小置信度门限的置疑[J].计算机科学,2007,34(6):216-218. 被引量:5
  • 3王洁松 张小飞.KDDCup99网络入侵检测数据的分析和预处理.科技信息,2008,(15):407-408.
  • 4蒋嶷川,田盛丰.数据挖掘在入侵检测系统中的应用[J].计算机工程.2011,4(2):21-25.
  • 5Gao H B,Li H,Qian C J. Parallel Monte Carlo Simulationof Single Polymer Chain[J]. Applied Mechanics and Materi-als,2012,263-266: 3317-3320.
  • 6Ayub M,Tiwana M H,Mann A B.Propagation of Sound inDuct with Mean Flow[J]. Commun Nonlinear Sci NumerSimulat,2009,14: 3578-3590.
  • 7Zhu Q Y,Yang X F,Ren J G. Modeling and analysis of thespread of computer virus [J].Communications in NonlinearScience and Numerical Simulation,2012,17(12):5117-5124.
  • 8Femando N,Hong Y,and ViterboE. Flip-OFDM for Unipo-lar Communication Systems[J]. IEEE Transactions on,2012,60(12):3726-3733.
  • 9Zhi Hua Zhou, Xu Ying Liu. Training cost - sensitive neural net- works with methodsaddressing the class imbalance problem [ J ]. IEEE Trans on Knowledge and Data Engineering,2006,18 (1) : 63 - 77.
  • 10Seung - Jae Jang, Young - Gu Lee, Kwang - Hyung Lee et al.. A Study on Group Key Agreement in Sensor Network Environments U- sing Two - Dimensional Arrays [ J ]. Sensors, 2011,11 ( 12 ) : 36 -53.

引证文献11

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部