期刊文献+

数据挖掘技术在网络型异常入侵检测系统中的应用 被引量:15

Anomaly Network Intrusion Detection System Based on Data Mining
下载PDF
导出
摘要 网络型异常检测的关键问题在于建立正常模式,将当前的系统或用户行为与建立好的正常模式进行比较,判断其偏离程度。简单介绍了数据挖掘算法以及基于数据挖掘的入侵检测系统的分类,从不同分类的角度介绍了数据挖掘方法在入侵检测系统中的应用。重点对比了模式比较的各种方法,并且使用网络型异常检测方法验证收集的正常数据是否充足的问题。 The key issue of anomaly NIDS is building normal patterns, comparing current system or user behaviors with history behaviors, and then detecting intrusion. We introduced some data mining algorithms, presentd a classification method of IDS based on data mining, and described the process of data mining application in anomaly NIDS from network layer and application layer. We proposed three methods of pattern comparison in detail, and verified that the obtained normal audit data is enough for network layer anomaly NIDS.'
出处 《计算机应用》 CSCD 北大核心 2003年第12期20-23,共4页 journal of Computer Applications
基金 国家 86 3计划项目 (2 0 0 1AA1 42 0 3 0 )
关键词 数据挖掘 异常检测 关联规则 序列模式 data mining anomaly detection association rules sequence pattern
  • 相关文献

参考文献1

二级参考文献7

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998 被引量:1
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132 被引量:1
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999 被引量:1
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998 被引量:1
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994 被引量:1
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994 被引量:1
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883 被引量:1

共引文献83

同被引文献63

引证文献15

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部