期刊文献+

基于数据发掘的入侵检测建模 被引量:10

Building Intrusion Detection Model Based on Data Mining
下载PDF
导出
摘要 数据发掘是从大量数据中发掘出新的、有用模式的过程。把它用于入侵检测,可从审计数据中发掘系统活动特征的有用模式,指导训练数据的收集和特征的选择,建立活动分类机制。研究了基于入侵检测模型建立的过程和所用到的算法。 Data mining is a process of identifying novel and potentially useful patterns in data. Using DM techniques,useful patterns of system behavior features can be discovered. The discovered patterns can guide the audit data gathering and feature selection ,and with the set of system feature,classifiers that can recognize anomalies and known intrusions can be computed.In this paper , we study the process of building ID model and the algorithms used. ;;;;
出处 《计算机工程》 CAS CSCD 北大核心 2002年第2期159-161,共3页 Computer Engineering
基金 华为科学基金资助项目
关键词 入侵检测 数据开采 建模 信息安全 网络安全 计算机网络 数据发掘 Intrusion detectionData miningAudit dataIntrusion detection modelClassifier
  • 相关文献

参考文献7

  • 1[1]Denning D E.An Intrusion-detection Model.IEEE Transactions on Software Engineering,1987,13(2)
  • 2[2]Anderson D,Frivold T H,Valdes A.Next-generation Intrusion-Detection Expert System(NIDES):A Summary.SRI-CSL-95-07,SRl International,Menlo Park,CA,1995-05
  • 3[3]Lee W,Stolfo S J.Data Mining Approaches for Intrusion Detection.In Proceeding of the 7th USENIX Security Symposium,San Antonio,TX,1998-01
  • 4[4]Agrawal R,Srikant R.Fast Algorithms for Mining Association Rules.Proceeding of the 20th VLDB Conference,Santiago,Chile,1994
  • 5[5]Mannila H,Toivonen H.Discovering Generalized Episodes Using Minimal Occurrences.Proceedings of the 2nd International Conference on KDD and DM,1996.08
  • 6[6]Cohen W W.Fast Effective Rule Induction.from Machine Learning.Proce,dings of the 12th International Conference,1995
  • 7[7]Mitchell T.Machine Learning.McGraw-Hill,1997

同被引文献27

引证文献10

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部