期刊文献+

基于数据挖掘的网络入侵检测技术:研究综述 被引量:13

A Survey of Data Mining-Based Intrusion Detection
下载PDF
导出
摘要 Intrusion detection techniques are attracted attention. There are a lot of projects which have their own emphasizes in the aspect now. The basic ideas and techniques of data mining-based intrusion detection and the architecture of a real time data mining-based IDS are discussed Some problems and the future directions are proposed. Intrusion detection techniques are attracted attention- There are a lot of projects which have their own emphasizes in the aspect now. The basic ideas and techniques of data mining-based intrusion detection and the architecture of a real time data mining-based IDS are discussed Some problems and the future directions are proposed.
出处 《计算机科学》 CSCD 北大核心 2003年第2期105-107,117,共4页 Computer Science
基金 国家自然科学基金(66973034) 国家自然科学基金(90104005)
关键词 数据挖掘 网络入侵检测技术 网络安全 计算机网络 人工神经网络 Network security , Intrusion detection, Data mining, Architecture
  • 相关文献

参考文献3

二级参考文献19

  • 1Ma Xiaoqiang,香港大学技术报告,1996年
  • 2Han J,Proceedings of ACM SIGMOD International Conference’96 on Management of Data (SIGMOD’96),1996年
  • 3Cheung D,Proceedings of the International Conference’96 on Data Engineering (ICDE’96),1996年
  • 4Han Jiawei,Proceedings of the International Conference’96 on Data Mining and Knowledge Discovery (KDD’96),1996年,250页
  • 5Lu Hongjun,IEEE Trans Knowl Data Eng,1996年,8卷,6期,957页
  • 6Wang Shan,计算机世界,1996年,7卷,28期,101页
  • 7Guo Yibin,PC World China(in Chinese),1996年,26页
  • 8Jia Hong,中国计算机用户,1996年,6页
  • 9Han J,Proceedings of 1995 International Conference on Very Large Data Bases (VLDB’95),1995年,420页
  • 10Han J,Proceedings of the 4th International Conference on Information and Knowledge Management (CIKM’95),1995年,19页

共引文献646

同被引文献60

引证文献13

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部