期刊文献+

基于混合数据挖掘方法的入侵检测算法研究 被引量:18

Research on Intrusion Detection Algorithm Based on Hybrid Data Mining Method
下载PDF
导出
摘要 入侵检测技术是一种主动保护自己免受攻击的网络安全技术,入侵检测系统处于防火墙之后,在不影响网络性能情况下对网络活动进行实时监测。传统的入侵检测系统面对海量的信息数据,不能及时有效地分析处理这些数据,而数据挖掘技术的运用正好能够满足入侵检测系统的要求,合理的分析数据,有效处理数据。文章针对目前入侵检测系统中存在的一些问题,重点阐述了数据挖掘算法在异常检测和误用检测中的具体应用。对于异常检测,主要运用了分类算法;对于误用检测,主要运用了聚类算法、关联规则和孤立点等算法。最后根据基于数据挖掘的入侵检测系统的主要优点对目前数据挖掘算法在入侵检测中应用所面临的难点进行了分析,并设计了国内第一个数据挖掘混合技术的入侵检测算法实例。 With the rapid development of computer technology, the degree of further strengthening the sharing of network resource, the resource sharing, the problem of network security has attracted increasing attention, the intrusion detection technology is an active protection against the attack of network security technology, intrusion detection systems in the firewal. The traditional intrusion detection systems in the face of vast amounts of information and data analysis of these data, can not be timely and effective treatment, using the data mining technology is able to meet the requirements of the intrusion detection system, data analysis and reasonable, effective data processing. In this paper, explain the importance and necessity of intrusion detection,according to the domestic and international situation, mining technology and intrusion detection technology based on the data, in the light of some problems existing in current intrusion detection system, expounds the data mining algorithm in the practical application of anomaly detection and misuse detection.Final y, in accordance with the analysis of the difficulties the main advantages of intrusion detection system based on data mining is the application of data mining algorithms in the intrusion detection system, and point out the research direction in the future.
作者 张旭东
出处 《信息安全与技术》 2015年第2期31-33,共3页
关键词 网络安全 入侵检测 数据挖掘 关联规则 聚类 network security intrusion detection data mining association rules clustering
  • 相关文献

参考文献8

二级参考文献39

  • 1宋世杰,胡华平,胡笑蕾,金士尧.数据挖掘技术在网络型误用入侵检测系统中的应用[J].计算机工程,2004,30(16):126-127. 被引量:9
  • 2杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 3赵月爱,彭新光.高速网络环境下的入侵检测技术研究[J].计算机工程与设计,2006,27(16):2985-2987. 被引量:15
  • 4Richard Stiennon. Intrusion Detection Is Dead-Long Live Intrusion Prevention. http: ∥ www. sans. org/rr/papers/index.php? id= 1028, 2003-06-11.
  • 5Peng Ning, Dingbang Xu. Learning attack strategies from intrusion alerts. The 10th ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., 2003.
  • 6Dan Schnackenberg, Harley Holliday, Randall Smith, et al.Cooperative intrusion traceback and response architecture.DARPA Information Survivability Conference and Exposition(DISCEX II'01), Anaheim, California, 2001.
  • 7Peng Ning, Y. Cui. An intrusion alert correlator based on prerequisites of intrusion. Department of Computer Science,North Carolina State University, Tech. Rep.: TR-2002-01,2002.
  • 8F. Cuppens, A. Miege. Alert correlation in a cooperative intrusion detection framework. The IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
  • 9A. Valdes, K. Skinner. Probabilistic alert correlation. The 4th Int'l Symposium on Recent Advances in Intrusion Detection(RAID 2001), Davis, CA, 2001.
  • 10O. Dain, R. K. Cunningham. Fusing a heterogeneous alert stream into scenarios. The 2001 ACM Workshop on Data Mining for Security Application, Philadelphia, Pennsylvania, 2001.

共引文献122

同被引文献140

引证文献18

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部