期刊文献+

基于模糊关联规则和遗传算法的入侵检测 被引量:1

Intrusion Detection System Based on Fuzzy Association Rules and Genetic Algorithm
在线阅读 下载PDF
导出
摘要 针对现行入侵检测系统的特点,提出一种基于模糊关联规则和遗传算法的入侵检测算法。通过实验结果分析得出,该方法比遗传算法和模糊关联规则算法具有更高的准确率和更好的收敛性。 In this paper, the existing characteristics of intrusion detection system is proposed based on fuzzy association rules and genetic algorithm for intrusion detection cloning. From the analysis and experimental result, the method than the genetic algorithm has a higher accuracy and better convergence.
作者 肖频
出处 《电脑编程技巧与维护》 2009年第10期117-118,共2页 Computer Programming Skills & Maintenance
关键词 入侵检测系统 遗传算法 模糊关联规则 Intrusion Detection System genetic algorithm fuzzy association rules
作者简介 肖频,男(1973-),讲师,硕士生,研究方向:计算机应用。
  • 相关文献

参考文献6

二级参考文献28

  • 1蔡罡,冯辉宗.基于协议分析状态机的入侵检测系统[J].重庆邮电学院学报(自然科学版),2005,17(1):97-101. 被引量:4
  • 2陈龙,王国胤.计算机取证技术综述[J].重庆邮电学院学报(自然科学版),2005,17(6):736-741. 被引量:49
  • 3Lee W, Stolfo S, Mok K. Mining Audit Data to Build Intrusion Detection Models. In: Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining Held in New York.New York, 1998-08:27-31
  • 4Ilgun K, Kemmerer A. State Transition Analysis: A Rule-based Intrusion Detection Approach. IEEE Transaction on Software Engineering, 1995, 21(3): 181-99
  • 5Kuok C, Fu A, Wong M. Mining Fuzzy Association Rules in Databases. SIGMOD Record, 1998, 17( 1 ): 4 1- 46
  • 6Zadeh L A. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes. IEEE Transactions on Systems, Man,and Cybernetics, SMC-3, 1973
  • 7AXELSSON S. Intrusion detection systems: A survey and taxonomy[R]. Technical Report No 99-15, Dept. of Computer Engineering,Chalmers University of Technology, Sweden, 2000.
  • 8DEBAR H, DACIER M, WEPSPI A. A Revised Taxonomy for Intrusion Detection Systems[R]. Technical Report, Computer Science/ Mathematics, IBM Research, Zurich Research Laboratory,Switzerland, 1999.
  • 9LEE W, STOLFO SJ, MOK KW. Mining audit data to build intrusion detection models[A]. Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining[C]. New York:AAAI Press. 1998.
  • 10LEE W, STOLFO S J, CHAN PK, eta/. Real Time Data Mining-based Intrusion Detection[A]. Proceedings of DISCEX Ⅱ[C]. Anaheim, USA, 2001.

共引文献20

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部