期刊文献+

一种基于关联规则的分布式入侵检测模型 被引量:2

A Model of Distributed Intrusion Detection Based on Association Rules
下载PDF
导出
摘要 高虚警率和漏警率是当前入侵检测系统(IDS)的主要问题。采用基于CBW关联规则的数据挖掘算法,提出了一种新的分布式入侵检测模型,并分析了各模块的具体功能与实现。经实验分析,本模型可以有效降低虚警率和漏警率,同时在一定程度上实现各分节点间的快速协作检测能力。 High rate of false alarms and missing alarms are the primary problem in current intrusion detection system (IDS). In this paper, a new model of distributed intrusion detection is proposed,which is based on CBW association rules algorithm to mine new rules and intrusion event, and the function and implement of each module is analyzed. The experiment result showed that this model could decrease false alarms rate and missed alarms rate effectually, this model could also improve detection speed and realize the cooperation among each code.
出处 《微处理机》 2008年第1期103-106,共4页 Microprocessors
基金 国家自然科学基金资助项目(60373088)
关键词 入侵检测 数据挖掘 关联规则 Intrusion detection Data mining Association rules
  • 相关文献

参考文献9

二级参考文献37

  • 1R Agrawal,T Imielinski,A Swami. Mining Association Rules Between Sets of Items in Large Databases[C].In:Proceedings of the ACM SIGMOD Conference on Management of data,Downloaded from http://www.cs.brandeis.edu/~cs227b/papers/decision-dataminingoverviewsigmod93.pdf, 1993: 207 ~216 被引量:1
  • 2R Agrawal. Ramakrishnan Srikant. Fast Algorithms for Mining Association Rules. IBM Almaden Research Center, 1996 被引量:1
  • 3S Brin,R Motwani,C Silverstein. Beyond market baskets:generlizing association rules to correlations[C].In:Proceedings of the ACM SIGMOD, 1996: 255~276 被引量:1
  • 4Buchanan B G,Mitchell T.Model-directed Learning of Production Rules. Waterman D A,Hayes-Roth F eds.Pattern Directed Inference Systems,Academic Press, 1978:297~312 被引量:1
  • 5T. Lunt. Detecting Intruders in Computer Systems. In:Proceedings of the 1993 Conference on Auditing and Computer Technology. 被引量:1
  • 6Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, and Alfonso Valdes. Detecting unusual program behavior using the statistical component of the next - generation intrusion detection system (NIDES). Technical Report SRI - CSL- 95 - 06,1995. 被引量:1
  • 7Herve Debar, Monique Becket, and Didier Siboni. A neural network component for an intrusion detection system. In:Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992:240 -250. 被引量:1
  • 8Cheri Dowd and Paul Ramstedt. The computer watch data reduction tool. In: Proceedings of the 13th National Computer Security Conference, 1990: 99 - 108. 被引量:1
  • 9Ian Goldberg, David Wagner, Randi Thomans, and Eric Brewer. A secure environment for untmsted helper applications(confining the wily hacker). In: Proceedings of the Sixth USENIX UNIX Security Symposium, 1996. 被引量:1
  • 10G. Fink and K. Levitt. Property'- based testing of privileged programs. In: Proceedings of the 10th Annual Computer Security Applications Conference, December 5 - 9 1994:154 - 163. 被引量:1

共引文献28

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部