期刊文献+

数据挖掘技术在入侵检测系统中的应用 被引量:1

The Application of the Data Mining Technology in IDS
下载PDF
导出
摘要 入侵检测系统是一种主动保护网络资源免受黑客攻击的安全技术.它不仅帮助系统对付外来网络攻击,还可以查知内部合法用户的非法操作,扩展了系统管理员的安全管理能力.入侵检测为系统提供实时保护,被认为是防火墙之后的第二道安全闸门.文章讲述了入侵检测技术,并提出了一种基于数据挖掘技术的入侵检测模型。 Intrusion detection system (IDS) is an active security technology which can prevent the network resources from being attacked by hackers. It can not only cope with external attacks but also detect the misuse of thc legitimate users. IDS extends the security administrator's ability .IDS offers real-time protection to system and is considered as the second line of defence behind firewall. In this paper we introduce technology of IDS and offer a datamining-based IDS model which can detect the known and unknown intrusion activities.
作者 汤卫东
出处 《广西民族学院学报(自然科学版)》 CAS 2002年第4期51-53,56,共4页 Journal of Guangxi University For Nationalities(Natural Science Edition)
关键词 入侵检测系统 数据挖掘 计算机信息安全 Intrusion detection system , Data mining ,Computer information security
  • 相关文献

参考文献5

二级参考文献11

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
  • 10Debar H,http://wwwietforg/internetdrafts/draftietfidwgdatamodel 0 3 txt,2000年

共引文献99

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部