期刊文献+

数据挖掘技术在入侵检测中的应用 被引量:15

Data Mining Techniques Applied for Intrusion Detection
下载PDF
导出
摘要 数据挖掘技术已在误用检测和异常检测中得到应用。论文介绍了数据挖掘在入侵检测系统研究中的一些关键的技术问题,包括规则挖掘算法、属性集的选择和精简、模糊数据挖掘等。最后深入讨论了入侵检测系统的自适应问题,并提出了相应的解决方法。 Data mining methods have been used to build automatic intrusion detection systems based on anomaly de-tection.The goal of this paper is to provide a survey of some works that employ data mining techniques for intrusion detection.And some critical technical problem is addressed,including rules mining algorithm,features selection and re-duction and integrating data mining with fuzzy logic,etc.A new idea is proposed toward how to improve the adaptability of IDS further,the solution way is also provided.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第6期158-161,共4页 Computer Engineering and Applications
关键词 入侵检测 数据挖掘 Intrusion detection,data mining
  • 相关文献

参考文献14

  • 1[1]Jiawei Han,Micheline Kamher. Data Mining:Concepts and Techniques [M].China Machine Press,2002
  • 2[2]R Agrawal,T Imielinski,A Swami.Mining association rules between sets of items in large database[C].In:Proc 1993 ACM SIGMOD International Conf on Management of Data, Washington, DC, 1993:207~216
  • 3[3]S Forrest,S A Hofmeyr,A Somayaji et al.A sense of self for unixprocesses[C].In:1996 IEEE Symposium on Security and Privacy,IEEE Computer Society, 1996:120~128
  • 4[4]W Lee,S Stolfo. Data mining approaches for intrusion detetion[C].In:Proc 7th USENIX Security Symposium(SECURITY′98),San Antonio,TX, 1998:79~94
  • 5[5]H Mannila,H Toivonen. Discovering generalized episodes using minimal occurrences[C].In :Proc 2nd International Conf. on Knowledge Dis~covery and Data Mining(KDD′96) ,Portland,OR, 1996:146~151
  • 6[6]F Shi.Genetic algorithms for feature selection in an intrusion detection application[D].Masters thesis. Mississippi State University,Mississippi State, MS, 2000
  • 7[7]R Mukkamala,J Gagnon,S jajodia. Integrating data mining techniques with intrusion detection[C].In:Proc 13th Annual IFIP WG 11.3 Working Conf on Database Security Seattle,WA,1999
  • 8[8]J Luo,S Bridges. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection[C].In:International Journal of Intelligent System,2000; 15(8) :678~703
  • 9[9]S Bridges,R Vaughn. Fuzzy data mining and genetic algorithms applied to intrusion detection[C].In:Proc 23rd National Information Systens Security Conf. Baltimore, MA, 2000
  • 10[10]W Lee,S Stolfo,K Mok. Mining audit data to build intrusion detection models[C].In:Proc 4th International Conf on Knowledge Discovery and Data Mining(KDD′98),New York City,NY,1998:66~72

同被引文献52

引证文献15

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部