期刊文献+

一种改进的基于数据挖掘的网络入侵算法

An Improved Network Intrusion Algorithm Based on Data Mining
下载PDF
导出
摘要 入侵检测系统作为一种主动的信息安全防御措施,有效地弥补了传统安全防护技术的不足,利用数据挖掘善于从大量数据中提取有用规则的特点,提出了一种改进的FP-Growth关联分析算法的网络入侵检测防御系统模型,该方法可以极大地提高数据挖掘的速度和节省数据挖掘中数据存储的空间。 As a kind of active securety defence measure, Intrusion Detection System acts as the effective complement to traditional protection techniques and takes a significant part in security. Data mining can extract the knowledge from a large number of data. In view of this, this paper proposes an Intrusion Detection System model based on the improved FP-Growth algorithm, which greatly improve the speed of data mining and save the storage space of data.
出处 《电脑开发与应用》 2012年第5期29-31,34,共4页 Computer Development & Applications
关键词 入侵检测 数据挖掘 FP—Growth算法 关联分析 intrusion detection, data mining, FP-Growth algorithm, association analysis
  • 相关文献

参考文献9

二级参考文献21

  • 1田新广,高立志,张尔扬.新的基于机器学习的入侵检测方法[J].通信学报,2006,27(6):108-114. 被引量:15
  • 2范明 孟小峰.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 3Gary R.Wright W.Richard Stevens 谢希仁校.TCP/IP详解[M].北京:机械工业出版社,2000..
  • 4Lee W,Stolfo S J,Mok K W.A data mining framework for building intrusion detection models[A].In Proceedings of the 1999 IEEE Symposium on Security and Privacy[C].Oakland,CA:[s.n.],1999.
  • 5Lee W,Stolfo S J.Data mining approaches for intrusion detection[A].In Proceedings of the 7th USENIX Security Symposium[C].San Antonio,TX:[s.n.],1998.
  • 6Chan P K,Stolfo S J.Toward parallel and distributed learning by meta-learning[A].In AAAI Workshop in Knowledge Discovery in Databases[C].[s.l.]:[s.n.],1993.227-240.
  • 7Lane T, Carla E B. An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection [ J ]. Machine Learning,2003,51 ( 1 ) :73-107.
  • 8Mukkamala S, Sung A H, Abraham A. Intrusion Detection Using an Ensemble of Intelligent Paradigms [ J ]. Journal of Network and Computer Application,2005,28 (2) : 167-182.
  • 9Lane T. Machine Learning Techniques for the Computer Security Domain of Anomaly Detection [ D ]. Purdue University, 2000.
  • 10Yan Qiao, Xie Wei-Xin, Yang Bin, et al. An Anomaly Intrusion Detection Method Based on HMM [ J ]. Electronics Letters,2002,38 (13) :663-664.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部