期刊文献+

一种基于关联规则挖掘的入侵检测系统 被引量:7

Association Rule- Based Network Intrusion Detection System
下载PDF
导出
摘要 为解决入侵检测系统普遍存在漏/误报率高、特征库需频繁升级、更新等问题,根据中科院高能所的网络环境,构建了一种基于关联规则挖掘算法的入侵检测系统。该系统可以通过训练数据生成通用的检测规则,并利用规则检测新的攻击。实验证明:该系统对未知攻击具有较好的检测速度和检测率。 In order to fix the problems existed in traditional IDS, e.g. high leak rate detection/false alarm rates and feature library needs frequently upgrade, based on IHEP network environment, this paper presented a new Intrusion Detection System based on association - rule mining algorithm. This system can detect unknown attack by generating rules from training data. Experiment proved that the system has great accuracy and performance on both unknown and known attack detection.
出处 《核电子学与探测技术》 CAS 北大核心 2015年第2期119-123,共5页 Nuclear Electronics & Detection Technology
基金 国家科技项目(2012BAH14B02) 国家信息安全专项(发改办高技[2012]1424号)资助
关键词 入侵检测 关联规则挖掘 APRIORI K-MEANS聚类 FP-GROWTH intrusion detection association rule mining Apriori K - means clustering FP - growth
  • 相关文献

参考文献7

  • 1Flora S, Tsai. Network Intrusion Detection Using As- sociation Rules [ J ]. International Journal of Recent Trends in Engineering ,2009,1 2(2 ) :202 - 203.
  • 2胡昌振.网络人侵检测原理与技术[M].北京:北京理工大学出版社,1996.
  • 3王怡,谢俊元.入侵检测系统中关联规则挖掘技术的研究[J].计算机科学,2008,35(10):81-82. 被引量:3
  • 4Agrawal R,Imielinski T,Swami A. Miring association rules between sets of items in large databases [ C ]. ACM SIGMOD Conference on Management of Data ( SIGMOD93 ), 1993,4:307 - 328.
  • 5王宗晨.基于数据挖掘的日志审计系统研究与实现[D].清华大学硕士论文,2008.
  • 6Pang - Ning Tan, Michael Steinbach, Vipin Kumar. Introduction to Data Mining [M].北京:人民邮电出版社,2011.
  • 7Mahbod Tavanae, Ebrahim Baghefi, Wei Lu and Ali A. Ghorbani. A Detailed Analysis of the KDD CUP 99 Dataset [ C ]. Proceedings of the 2009 IEEE Sym- poslurn on Computational Intelligence in Security and Defense Applications ( CISDA 2009).

二级参考文献5

  • 1高俊,施伯乐.快速关联规则挖掘算法研究[J].计算机科学,2005,32(3):200-201. 被引量:10
  • 2胡昌振.网络入侵检测原理与技术[M].北京理工大学出版社,1996
  • 3Han Jiawei, Kamber M. Data Mining Concepts and Techniques[M].范明,盂小锋,等译.机械工业出版社,2000
  • 4Lippmann R, et al. The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks, 2000,34(4) : 579-595
  • 5Xia Hongxia, Shen Qi, et al. Application of Data Mining Technology to Intrusion Detection System//Proceedings of the 2004 International Symposium on Distruibured Computing and Applications to Business Engineering and Science[R]. Wuhan, china, 2004

共引文献2

同被引文献30

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部