期刊文献+

基于Rough Set的数据挖掘技术在网络安全中的应用研究 被引量:2

Research on Application of Data Mining Based on Rough Set in Network Security
下载PDF
导出
摘要 随着计算机网络技术和互联网技术的飞速发展,计算机的使用逐渐普及,越来越多的人使用互联网,而保障网络的安全性变得尤为重要。目前,Rough Set理论已成为一个热门话题。基于此,笔者根据网络安全现状,探讨基于Rough Set的数据挖掘技术在网络安全中的应用。 With the rapid progress of computer network technology and Internet technology, the use of computers is popularized, and more and more people use the Internet, and it becomes particularly important to ensure the security of the network. At present, the theory of Rough Set has become a hot topic. Based on this, the author discusses the application of data mining technology based on Rough Set in network security according to the current situation of network security.
作者 曹亚非 Cao Yafei(Hunan Arts and Crafts Vocational College, Yiyang Hunan 413000, China)
出处 《信息与电脑》 2018年第7期133-135,共3页 Information & Computer
关键词 ROUGH SET 数据挖掘技术 网络安全 入侵检测 Rough Set data mining technology network security intrusion detection
  • 相关文献

参考文献2

二级参考文献11

  • 1Mukherjee B,Heberlein T L,Levitt K N. Network intrusion detection. IEEE Network,1994,8(3):26-41
  • 2Lee W,Stolfo S J, Mok K. Data mining in workflow environments: Experiences in intrusion detection. In:Proc. of the 1999Conf. on Knowledge Discovery and Data Mining (KDD99), 1999
  • 3Forrest S,Perelson A S,Allen L. Self-nonself discrimination in a computer. In:Proc. of the 1994 IEEE Symposium on Research in Security an Privacy, 1994
  • 4Lane T,Brodley C E. Detecting the Abnoraml: Matchine Learning in Computer Security:[Technical Report ECE-97-1]. 1997
  • 5Bazan J G,Skowron A,Synak P. Dynamic reducts as a tool for extracting laws from decision tables. In:Proc. Intl. Symposium on Methodologies for Intelligent Systems, volume 869 of LectureNotes in Artificial Intelligence,Springer-Verlag, 1994. 346~355
  • 6Li Renpu,Wang Zheng-ou. Mining classification rules using rough sets and neural networks. European Journal of Operational Research ,Sept. 2003
  • 7Vinterbo S,φhrn A. Minimal approximate hitting sets and rule templates. Intl. Journal of Approximate Reasoning,2000,25(2):123-143
  • 8Anderson JE Computer Security Threat Monitoring and Surveance[R].James P.Anderson Company,Fort Was- hintton,Pennsvlvania.Revort.Ntlmber.79F296400,1980.
  • 9Luo WJ,Zhang SH,Liang Wj etaLNIDS research advance based on artificial immunology [J].Journat of China University of Science and Technology, 2002.
  • 10郭巍,吴承荣,金晓耿,张世永.入侵检测方法概述[J].计算机工程,1999,25(S1):167-170. 被引量:12

共引文献9

同被引文献12

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部