期刊文献+

数据挖掘技术在计算机入侵检测中的应用 被引量:4

The Application of Data Mining Technology in Computer Intrusion Detection
下载PDF
导出
摘要 分析了聚类、分类、关联规则等在IDS中常用的数据挖掘算法,并介绍了DAID这种以数据库为中心的数据挖掘体系架构模型,对其数据处理过程进行展现。 This paper analyzes the clustering, classification, association rules in IDS commonly used data mining algorithms, and introduces the DAID database centric data mining system architecture model, the data processing process is show.
出处 《科技通报》 北大核心 2013年第10期19-20,23,共3页 Bulletin of Science and Technology
关键词 数据挖掘 入侵检测系统 数据库 算法 date mining IDS database algorithm
  • 相关文献

参考文献5

  • 1Ming Xue,Changjun Zhu.Applied Research on Data Min-ing Algorithm in Network Intrusion Detection[C]//ArtificialIntelligence, 2009. JCAI '09. International Joint Confer-ence on. Publication Year,2009: 275 - 277.
  • 2Wenke Lee,Stolfo S J.A data mining framework for build-ing intrusion detection models [C]//Security and Privacy,1999. Proceedings of the 1999 IEEE Symposium on Pub-lication Year, 1999: 120 - 132 .
  • 3宋淑彩,祁爱华,王剑雄.面向Web的数据挖掘技术在网站优化中的个性化推荐方法的研究与应用[J].科技通报,2012,28(2):117-119. 被引量:49
  • 4Wenke Lee,Stolfo S J,Chan P K.Real time data mining -based intrusion detection [C]//Pattem Recognition, Infor-matics and Medical Engineering (PRIME), 2012 Interna-tional Conference on.Publication Year, 2001:89-100.
  • 5Campos M M,Milenova B L. Creation and deployment ofdata mining-based intrusion detection systems in OracleDatabase lOg [C]//Machine Learning and Applications,2005.Proceedings. Fourth International Conference on.Publication Year,2005.

二级参考文献4

共引文献48

同被引文献30

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部