期刊文献+

一种基于数据挖掘的入侵检测方法

下载PDF
导出
摘要 现有的入侵方法不但扩展性和适应性上不尽如人意,入侵的检测效率也比较低。而以数据为中心是数据挖掘技术的核心观点,相较于其他的检测方法,其把入侵检测看做一个数据分析过程,运用数据挖掘中的算法来建立入侵检测系统,尽量减少了手工和经验的影响,较好地解决了有效性、扩展性和适应性的问题。
作者 金益
出处 《电子技术与软件工程》 2014年第2期227-227,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献1

二级参考文献17

  • 1MICHAEL J A B, LINOFF G.Data Mining Techniques: For Marketing, Sales,and Customer Support[M].New York:Wiley, 1997.
  • 2JOSEPH P B. Data Mining with Neural Networks[M].New York:McGraw-Hill,1996.
  • 3USAMA M F.Gregory Piatetsky-Shapiro,Padhraic Smyth,From Data Mining to Knowledge Discovery: An Overview[A].FAYYAD U M,PIATESTKY-SHAPIRO G,SMYTH P,et al.Advances in Knowledge Discovery and Data Mining[C].AAAI Press/The MIT,1996.
  • 4LEE Wenke,STOLFO Sal,MOK Kui. Mining Audit Data to Build Intrusion Detection Models[C].New York:Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining(KDD′98),1998.
  • 5LEE Wenke. STOLFO Sal,MOK Kui.A Data Mining Framework for Building Intrusion Detection Models[C]. Oakland CA:Proceedings of the 1999 IEEE Symposium on Secruity and Privacy,1999.
  • 6LEE Wenke,STOLFO Sal.Data Mining Approaches for Intrusion Detection[C]. San Antonio,TX:Proceedings of the 7th USENIX Security Symposium,1998.
  • 7PORTNOY L,ESKIN E, STOLFO S J. Intrusion Detection with Unlabeled Data Using Clustering[C]. Philadelphia:Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA-2001),ACM Press,2001.
  • 8RICHARD P L,DAVID J F,ISAAC G,et al.Evaluating Intrusion Detection System:The 1998 DARPA Off-Line Intrusion Datection Valuation[C].Hilton:Proceedings of the 2000 DARPA Information Survivability Conference and Exposition,AAAI Press,2000.
  • 9BARBAR D,COUTO J.JAJODIA S,et al.ADAM:Detecting Intrusions by Data Mining[M].West Point,NY:Proceedings of the IEEE SMC Information Assurance Workshop,2001.
  • 10MUKKAMALA R,GAGNON J,JAJODIA S.Integrating Data Mining Techniques with Intrusion Detection Methods[R].Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security:Research Advances in Database and Information Systems Security,1999.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部