期刊文献+

基于数据挖掘的入侵检测系统设计和实现 被引量:4

Design and Implement of Intrusion Detection System based on Data Mining
下载PDF
导出
摘要 随着网络入侵技术的不断发展,入侵的行为表现出不确定性、复杂性、多样性等特点,入侵检测面临许多有待解决的关键问题。本文详细介绍了基于数据挖掘的入侵检测系统的设计和具体实现,也就是用于数据预处理和分类、聚类挖掘的数据挖掘技术。在数据预处理中,我们使用基于属性抽取的方法去除干扰属性。最后,我们对系统进行了测试,通过测试结果我们发现挖掘的效率和正确率,而系统确实能够有效的检测到已知未知攻击。 As the development of the network intrusion technology, the action of intrusion represents variable, complicated, and uncertainty eharacteristic. Therefore, it faces so many problems to resolve for intrusion detection. We introduee the design and implementa- tion of the system which adopt the Data Mine technology of data pretreatment, classify and cluster patterns mine. We use the method based on features selection to get rid of noises. Finally, we give a test to the system. Through the test, we find that our intrusion detection system is efficient to detect known and unknown attack.
出处 《微计算机信息》 北大核心 2008年第33期61-62,55,共3页 Control & Automation
关键词 入侵检测 数据挖掘 信息安全 Intrusion Detection Data Mining Information Security
  • 相关文献

参考文献3

二级参考文献12

  • 1王杰,王金磊.分布式入侵检测技术在网络控制系统中的应用[J].微计算机信息,2005,21(07X):90-92. 被引量:18
  • 2Barton P Miller,David Koski,Cjin Pheow Lee,etc.Fuzz revisited:A re-examination of the reliability of UNIX utilities and services [R].Technical report,CS-TR -95-1268,Computer Sciences Department,University of Wisconsin,1995.
  • 3W Lee,S J Stolfo.Data mining approaches for intrusion detection [A].In Proceed ings of the 7th USENIX Security Symposium [C].San Antonio,Texas,USA:1998.
  • 4John P Wack,Lisa J Carnahan.Keeping your site comfortably secure: An Introductio n to Internet Firewalls [DB/OL].NIST Special Publication 800-10,U.S.DEPARTMENT OF COMMERCE. .
  • 5S Forrest,S A Hofmeyr,A Somayaji,T A Longstaff.A sense of self for UNIX processe s [A].In Proceedings of the 1996 IEEE Symposium on Security and Privacy [C]. Los Alamitos,CA:1996.120-128.
  • 6S A Hofmeyr,S Forrest,A Somayaji.Intrusion detection using sequences of system c alls [J].Journal of Computer Security,1998,6:151-180.
  • 7W Lee,S J Stolfo,P K Chan.Learning patterns from UNIX process execution traces f or intrusion detection [A].AAAI Workshop on AI Approaches to Fraud Detection a nd Risk Management [C].AAAI Press,1997.7:50-56.
  • 8G G Helmer,J S K Wong,V Honavar,L Miller.Intelligent agents for intrusion detect ion [A].In Proceedings IEEE Information Technology Conference [C].Syracuse,N Y:1998.121-124.
  • 9C Warrender,S Forrest,B Pearlmutter.Detecting intrusions using system calls:alte rnative data models [A].In Proceedings of the 1999 IEEE Symposium on Security and Privacy [C].Los Alamitos,CA:IEEE Computer Society,1999.133-145.
  • 10Wojciech Purczynski.Sendmail & procmail local root exloits on Linux kernel up to 2.2.16pre5 [DB/OL].BUGTRAQ Mailing list(bugtraq@securityfocus.com),2000-06-09 .

共引文献27

同被引文献6

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部