期刊文献+

数据挖掘方法在入侵检测系统中的应用 被引量:2

The Application of Data Mining in Intrusion Detection System
在线阅读 下载PDF
导出
摘要 任何一种检测方法都不能检测出所有入侵行为,一个完善的入侵检测系统应该是多种检测手段的综合运用。本论文的研究目标是借用数据挖掘技术探寻一种检测方法,使之有效识别已知入侵,并具备对未知类型数据的检测能力。实验证明,该方法对扫描与拒绝服务两种攻击类型具有理想的检测效果。 No a detection method can detect all of intrusion behaviors,a perfect IDS should be a unity of multiple detection means.This paper s object is to develop a detection approach based on data mining technology,which can detect known intrusion effectively and has a good capacity to recognize unknown data schema which can t be detected effectively in traditional IDS.The experiments proved that the method is effective to detect intrusion such as scanning and DoS.
作者 赵艳杰
机构地区 潍坊学院
出处 《潍坊学院学报》 2008年第2期19-22,共4页 Journal of Weifang University
关键词 入侵检测系统 数据挖掘 网络安全 intrusion detection system data mining network security
  • 相关文献

参考文献2

二级参考文献13

  • 1[1]Pichler M. Analyzing selected network attacks. IBM, 2002
  • 2[2](美)无名氏著,王锐等译.网络最高安全技术指南.北京:机械工业出版社,1998
  • 3Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 4Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 5Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 6Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.
  • 7Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456.
  • 8Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996.
  • 9Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997.
  • 10Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999.

共引文献47

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部