期刊文献+

数据挖掘在协同入侵检测系统中的应用研究 被引量:2

Research on Application of Data Mining in Cooperative Intrusion Detection System
下载PDF
导出
摘要 随着网络安全问题的日益重要,入侵检测领域的研究越来越深入,但目前IDS的误报和漏报不能使人满意。该文提出了一种基于数据挖掘方法的协同入侵检测系统(CoIDS)框架。文章详细讨论了协同工作和数据挖掘方法在入侵检测中的应用。使用了多种数据挖掘方法来建立检测模型,并采用了Agent/Manger/UI三层实体结构。并通过具体的例子重点介绍了在此框架中数据挖掘的应用过程。 With network security problem increasingly important ,the research on intrusion detection is going deeper and more deeper,but current IDS's false positve rate and false negative rate are not satisfying.This paper describes a CoIDS framework based on data mining approach.We discuss the application of CSCW and data mining techniques in intrusion detection.We use several data mining approach to create detection model,and use Agent/Manager /UI three-layer entity architecture.In addtion,we stress data mining process using in our framework trough some examples.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第21期140-143,146,共5页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(编号:2001AA142020)
关键词 网络安全 入侵检测 协同工作 数据挖掘 协同入侵检测 network security,intrusion detection,CSCW,data mining,cooperative intrusion detection
  • 相关文献

参考文献11

  • 1史美林 何浩 董永乐.协同入侵检测系统框架的研究与设计[A]..第二届全国CSCW会议[C].上海,2000..
  • 2DeborahFrincke DonTobin etal.A Framework for Cooperative Intrusion Detection.http://www.securityfocus.com,1998.
  • 3史美林等.计算机支持协同工作的理论和应用[M].北京:电子工业出版社,2000..
  • 4Julia Allen et al.State of the Practice of Intrusion Detection Technologies.by CMU,2000.
  • 5W Lee,S J Stolfo,K W Mok.A data mining framework for building intrusion detection models[C].In:Proceedings of the 1999 IEEE Symposium on Security and Privacy,1999.
  • 6W Lee,S J Stolfo,K W Mok.Mining audit data to build intrusion detection models[C].In:Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining,New York,NY,AAAI Press, 1998.
  • 7Daniel Barbara,Julia Couto,Sushil Jajodia et al.ADAM:A Testbed for Exploring the Use of Data Mining in Intrusion Detection[M].Center for Secure Information Systems,George Mason University,2001.
  • 8Tamas Abraham.IDDM:Intrusion Detection using Data Mining Technique[M].Information Technology Divlsion,Electronics and Surveillance Research Laboratory ,2000.
  • 9R Agrawal,T Imielinski,A Swami.Mining Association rules between sets of items in large databases[C].In:Proceedings of the ACM SIGMOD Conference on Management of Data, 1993:207-216.
  • 10H Mannila,H Toivonen,A I Veckamo.Discovefing frequent episodes in sequences[C].In:Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining,Montreal,Canada, 1995.

同被引文献18

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部