期刊文献+

基于异类挖掘的网络入侵检测方法 被引量:6

Network Intrusion Detection Method Based on Outlier Mining
下载PDF
导出
摘要 针对目前基于异常入侵检测方法所存在的问题,提出了一种基于异类挖掘的聚类方法,该方法通过对采用多种不同类型描述的连接记录对象进行异类数据挖掘,从而实现从大流量网络活动记录数据中快速检测出与正常系统与网络活动相异的已知或未知入侵行为。最后利用KDD'99入侵检测大赛的数据对所提方法进行了检验,实验结果表明了此方法是有效的。 s This paper proposes a new clustering method based on the outlier mining in order to solve the problems of intrusion detection based on outlier. This new method is able to find out novel intrusions involved in large amount of normal system and network activities quickly and effectively. Finally the experiment result made on test data of KDD 1999 intrusion detection competition cup indicates the efficiency of the method.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第13期125-127,共3页 Computer Engineering
关键词 入侵检测 异类挖掘 聚类分析 网络入侵 Intrusion detection Outlier mining Clustering analysis
  • 相关文献

参考文献5

  • 1Eskin E,Arnold A,Prerau M,et al A Geometric Framework for Unsupervised Anomaly Detection:Detecting Intrusions in Unlabeled Data To Appear in Data Mining for Security Applications,Kluwer,2002.
  • 2Lee W.A Data Mining Framework lbr Building Intrusion Detection Models IEEE Symposium on Security and Privacy,Berkeley,California,1999-05:120-132.
  • 3Erbacher R F,Walker K L,Frincke D A Intrusion and Misuse Detection in Large-scale Systems.IEEE Computer Graphics and Applications,2002-1/2,22(1):38-47.
  • 4Zhang T,Ramakrishnan R Borch M L.An Effiencient Data Clustering Method for Very Large Databases Proc.of 1 996 ACM SIGMOD International Conference on Management of Data,1 996:67.
  • 5KDD Cup 1999 Dataset.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.1999.

同被引文献26

引证文献6

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部