期刊文献+

基于数据挖掘技术的网络入侵检测系统设计 被引量:4

The Design of the Network Intrusion Detection System Based on Data Mining
下载PDF
导出
摘要 随着互联网的迅速发展,许多新的技术被引入到信息安全领域。在基于数据挖掘的入侵检测系统中,系统构造是一个关键环节。本文介绍了基于数据挖掘的入侵检测系统的设计方案,把数据挖掘技术引入了入侵检测系统中。 Along with the high speed development of internet,a lot of new technology is introduced into information security field.In the realization of data mining-based intrusion detection system,feature construction is a key process.The paper introduces the design of the intrusion detection system based on data mining.That is data mining is introduced into intrusion detection system.
出处 《电脑知识与技术》 2006年第1期98-99,共2页 Computer Knowledge and Technology
关键词 入侵检测:数据挖掘:信息安全 intrusion detection data mining information security
  • 相关文献

参考文献3

二级参考文献18

  • 1王国胤.Rough集理论与知识获取[M].,2000-09.. 被引量:1
  • 2[1]Wenke Lee,Salvatore J Stolfo,Kui W Mok. A Data Mining Framework for Building Intrusion Detection Models[C].In:Proceedings of the 1999 IEEE Symposium on,1999:120~132 被引量:1
  • 3[2]Stephe Kent. On the trail of Intrusion into Information Systems[J].IEEE Spectrum,2000 被引量:1
  • 4[3]Nong Ye,Xiangyang Li,Qiang Chen. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data[J].Man and Cybernetics,Part A ,IEEE Transactions on,2001:31 (4) :266~274 被引量:1
  • 5[4]W W Cohen. Fast effective rule induction In Machine Learning[C].In: the 12th International Conference, Lake Taho,CA, 1997 被引量:1
  • 6[5]Mauro Cesar Bernardes,Edson dos Santos Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In :Software Engineering for Parallel and Distributed Systems,2000 Proceedings International Symposium on, 2000 被引量:1
  • 7Lee W, Stolfo S, Chart P, et ai. Real Time Data Mining-based Intrusion Detection.The 2001 DARPA Information Survivability Conference and Exposition (DISCEX II), Anaheim, CA,2001-06. 被引量:1
  • 8Lee W, Stolfo S, Mok K. Mining Audit Data to Build Intrusion Detection Models. The Fourth International Conference on Knowledge Discovery and Data Mining (KDD 98), New York, NY, 1998-08. 被引量:1
  • 9Lee W, Stolfo S. Data Mining Approaches for Intrusion Detection. The Seventh USENIX Security Symposium (SECURITY98),San Antonio,TX, 1998-01. 被引量:1
  • 10Agrawal R, Srikant R. Mining Sequential Patterns. In: Proc., 1995 Int.Conf. Data EngIneering (ICDE95), Taipei, Taiwan, 1995-03. 被引量:1

共引文献19

同被引文献19

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部