期刊文献+

基于Unix系统调用的数据挖掘算法 被引量:2

Data Mining Arithmetic Based on Unix System Calls
下载PDF
导出
摘要 将数据挖掘方法应用于入侵检测中研究的一个重要方向是,对Unix环境下特定程序运用关联、序列等数据挖掘算法。该文简单描述了目前比较成熟的几种算法思想,重点介绍了RIPPER分类算法,并提出了一些改进思想。 Applying data mining algorithm to intrusion detection is a major research direction in computer security. Especially, when using data mining algorithm such as association analysis, sequence mining to analyze suid programs in Unix environment, the future is much promising. This paper introduces some mature data mining algorithm in brief and gives emphasis to RIPPER sort algorithm, finally, gives improvement thought to RIPPER.
作者 赵斌 戴英侠
出处 《计算机工程》 CAS CSCD 北大核心 2004年第3期22-23,共2页 Computer Engineering
基金 国家重点基础研究发展规划项目(G1999035801) 国家自然科学基金项目(90104030)
关键词 数据挖掘 机器学习 入侵检测 Data mining Machine study Intrusion detection
  • 相关文献

参考文献4

  • 1[1]Forrest S, Hofmeyr S A, Somayaji A, ct al. A Sense of Self for Unix Process. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996:120-128
  • 2[2]Hofmeyr S A, Forrest S. Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 1998,(61:151 - 180
  • 3[3]Lee W. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems [PhD Thesis]. Columbia University, 1999-06
  • 4[4]Lindqvist U, Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset(P-BEST). In Proceedings of the1999 Symposium on Security and Privacy, Oakland,California, IEEE Computer Society, 1999-05

同被引文献45

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2曹元大,徐漫江.一种基于系统调用分析的入侵检测方法及其应用[J].计算机工程,2004,30(15):114-116. 被引量:1
  • 3王凤先,张岩,刘振鹏,王静红.基于系统调用的入侵检测规则的生成[J].计算机工程与应用,2005,41(3):75-76. 被引量:4
  • 4王宇,刘文予,罗宁.基于扩充数据源的系统调用异常检测算法[J].计算机与数字工程,2006,34(1):13-16. 被引量:3
  • 5WANG Li-jun,GAO Chao.Rough set theory's application on intrusion detection based on system calls[DB/OL].http://www.worldscibooks.com/compsci/5966.html.
  • 6VINTERBO S,OHNO-MACHADO L.Minimal approximate hitting sets and rule templates[J].International Journal of Approximate Reasoning,2000,25(2):123-143.
  • 7DENNING D E.An intrusion-detection model[J].IEEE Transactions Software Engineering,1987,SE-13:222-232.
  • 8FORREST S,HOFMEYR S A,SOMAYAJI A,et al.A sense of self for unix processes[DB/OL].http://www.cs.unm.edu/~forrest/publications/ieee-sp-96-unix.pdf..
  • 9HOFMEYR S A,FORREST S,SOMAYAJI A.Intrusion detection using sequences of system calls[J].Jouranl of Computer Security,1998,6(3):151-180.
  • 10WARRENDER C,FORREST S.Detecting intrusions using system calls:alternative data models[DB/OL].http://www.cs.iastate.edu/~honavar/hmm-intrusion.pdf.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部