期刊文献+

基于K-Means聚类算法入侵检测系统研究 被引量:3

Research on Intrusion Detection Based on K-means algorithms Clusting Algorithm
下载PDF
导出
摘要 网络安全是网络研究的热点,而随着对计算机系统弱点和入侵行为分析研究的深入,入侵检测系统在网络安全中发挥着越来越重要的作用,并成为处理网络安全问题的有效工具。提出的许多聚类算法及其变种在增量式聚类算法研究方面所做工作较少的问题。通过对K-Means聚类算法、迭代算法的改进,提出优化算法。很好地解决传统聚类算法在伸缩性、数据定期更新上所面临的问题。基于K-Means聚类算法入侵检测系统中重要的数据集常用的数据分析方法,搭建检测系统发现入侵行为。 The network security is becoming a hot area in network researches. With the comprehensive analysis of the vulnerabili- ty of the network and intrusion behaviors, the Intrusion Detection System (IDS) becomes more and more important in network security. IDS is an important supplement to the traditional network security technologies. When updates are collected and ap- plied to the databases ,then,all patterns derived from the databases by K-means algorithms have to be updated as well. Due to the very large size of the databases,it is highly desirable to perform these updates incrementally. The commonly-used Tec logical means of data analysis and the development trend of the intrusion detection technology.Experimental results show that the algo- rithms proposed in this paper are efficient, and the anticipated results are realized.
作者 凤祥云 FENG Xiang-yun (Department of Electrical Engineering, Hebei Vocational & Technical College of Building Materials, Qinhuangdao 066000, Chi- na)
出处 《电脑知识与技术》 2016年第6期49-51,共3页 Computer Knowledge and Technology
关键词 网络入侵检测 K-MEANS算法 迭代最优算法 NIDS设计 network security intrusion detection iterative algorithm K-means algorithms research on NIDS
  • 相关文献

参考文献12

二级参考文献29

  • 1Rebecca Gurley Bace 陈明奇等(译).入侵检测[M].北京:人民邮电出版社,2001..
  • 2-.入侵检测管理员手册[M].北京:人民邮电出版社,2000..
  • 3[1]Debar H,Dacier M,Wespi A.Towards A Taxonomy of Intrusion-Detection Systems[J].Computer Networks.1999,31:805-822.
  • 4[2]Denning D E.An Intrusion Detection Model[J].IEEETransaction on Software Engineering.1987,13(2):222-232.
  • 5[3]Lunt T F.A Survey of Intrusion Detection Techniques[J].Computer&Security.1993,(12):405-418.
  • 6[4]Sommer P.Intrusion Detection System as Evidence[J].Computer Networks.1999,31:2477-2487.
  • 7[6]Zhang Cui,Levitt K,Heckman M.Intrusion Detection Inter-Component Adaptive[J].Computer Network.2000,(34):605-621.
  • 8Lee W, Stolfo S J . Data Mining Approach for Intrusion Detection In: Proceedings of the 7th USENIX Security Symposium,San Antonio,TX., 1998-01-26.
  • 9Lee W, Stolfo S J, Philip K, et al. Rea-time Data Mining-based Intrusion Detection. In: Proceedings of DISCEX Ⅱ,2001-06.
  • 10Honig A, Howard A, F.skin E, et al. An Architecture for Deployment of Data Mining-based Intrusion Defection Systems. To Appear in Data Mining for Security Applications, Kluwer , 2002.

共引文献145

同被引文献11

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部