期刊文献+

数据挖掘技术在入侵检测系统中的应用 被引量:8

Application of Data Mining Technology to Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统是近年来出现的网络安全技术。该文首先介绍了入侵检测系统的相关技术和评测指标,然后着重介绍了将数据挖掘技术应用于入侵检测系统,在此基础上设计了一个入侵检测系统结构框图,并提出了一种基于数据挖掘技术的入侵检测系统自适应产生模型,从而说明将数据挖掘技术应用于入侵检测是有效的。 Intrusion Detection is a new security technique.This article introduces the correlative techniques and evalua-tion guidelines about Intrusion Detection,t hen emphatically introduces using Data Mining technology in Intrusion Detec-tio n System.On the basis of these contents,the paper designs a framework for Intr usion Detection Systems.At the end,it present s an adaptive model generation for Intrusion Detection Systems based on Data Mining technology.A conclusion t hat using Data Mining Technology to Intrusion Detection is efficient is drawn.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第17期153-156,160,共5页 Computer Engineering and Applications
基金 教育部科学技术研究重点项目
关键词 入侵检测 数据挖掘 自适应产生模型 Intrusion Detection,Data Mining,Adaptive Model Generation
  • 相关文献

参考文献8

  • 1王国胤.Rough集理论与知识获取[M].,2000-09..
  • 2Edward G Amoroso.Fundaments of Computer Security Technology[M]. Upper Saddle River,NJ:Prentice-Hall PTR,1994.
  • 3S J Stolfo,A L Prodromidis,S Tselepis et al.JAM:Java agents for metalearning over distributed databases[C].In:Proceedings of the 3^rd International Conference on Knowledge Discovery and Data Mining,Newport Beach ,CA ,AAAI Press, 1997:74-81.
  • 4P K Chan,S J Stolfo.Toward parallel and distributed learning by metalearning[C].In:AAAI Workshop in Knowledge Discovery in Databases, 1993 : 227-240.
  • 5W LEE,S J Stolfo,K W Mok.Mining in a data_flow environment:Experience in intrusion detection[M].submitted for publication, 1999.
  • 6R Agrawal,T Imielinski,A Swami.Mining association rules between sets of items in large databases[C].In:Proceedings of the ACM SIG--MOD Conference on Management of Data,1993:227-240.
  • 7Wenke Lee,Salvatore J Stolfo,Kui W Mok.A Data Mining Frarnework for Building Intrusion Detection Models.1999.
  • 8Eleazar Eskin,Matthew Miller,Zhi-Da Zhong et al.Adaptive Model Generation for Intrusion Detection Systems.

同被引文献48

引证文献8

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部