期刊文献+

基于模糊序列模式挖掘的网络异常检测

Network Anomaly Detection Based on Fuzzy Sequential Pattern Mining
下载PDF
导出
摘要 序列模式挖掘技术在网络入侵检测中极具应用潜力。该文将模糊序列模式挖掘引入网络异常检测,构建了基于模糊序列模式挖掘的网络异常检测模型,介绍了模型中的主要工作流程。 Sequential pattern mining technique have great potential applications in network intrusion detection.This paper introdues fuzzy sequential pattern mining into network anomaly detection,constructs a network anomaly detection model based on fuzzy sequential pattern mining and presents the main workflows in the model.
作者 陈晓 CHEN Xiao(Shanxi University of Finance and Economicsi,Taiyuan,030006,China)
机构地区 山西财经大学
出处 《电脑知识与技术》 2009年第12X期10450-10451,共2页 Computer Knowledge and Technology
关键词 模糊集 序列模式挖掘 异常检测 fuzzy sets sequential pattern mining intrusion detection
  • 相关文献

参考文献4

二级参考文献36

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883
  • 8[1]Lee W and Stolfo S J. Data mining approaches for intrusion detection [C]. Proceedings of the 7th USENIX Security Symposium, 1998, (1):26~29.
  • 9[3]Lee W,Stolfo S J and Mok K W. A data mining framework for building intrusion detection models[J]. IEEE Symposium on Security and Privacy, 1999.
  • 10[4]Han J, Dong G and Yin Y. Efficient mining of partial periodic patterns in time series database[C]. Proc Int. Conf on Data Engineering(ICDE99) ,March 1999,105~ 115.

共引文献139

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部