期刊文献+

C4.5算法在Snort入侵检测信息模糊聚合上的应用

Application of C4.5 algorithm in Snort intrusion detection for information fuzzy aggregation
下载PDF
导出
摘要 提出一种基于C4.5算法的Snort报警信息模糊聚合的自适应改进模型,通过对入侵属性在入侵行为上的影响差异的规则挖掘,构建调整模型,主动修改决策属性的权重矩阵,自主适应网络入侵环境的变化,提高报警信息聚合的准确率。 An improved adaptive model based on CA. 5 algorithm for fuzzy aggregating Snort intrusion alarms was presented. With the rule-mining of the diff erence impact on intrusion properties based on intrusion action, the model was adjusted, and the weight matrix of decision-making property was amended. Therefore the variety of intrusion environment was adapted actively, and the accuracy rate of intrusion alarm aggregation was enhanced.
作者 蹇滔 胡鹏
出处 《计算机应用》 CSCD 北大核心 2009年第B12期97-99,共3页 journal of Computer Applications
关键词 C4.5算法 SNORT 报警聚合 模糊聚合 C4.5 algorithm Snort alert aggregation fuzzy aggregation
  • 相关文献

参考文献5

二级参考文献10

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:50
  • 2Richard Stiennon. Intrusion Detection Is Dead-Long Live Intrusion Prevention. http: ∥ www. sans. org/rr/papers/index.php? id= 1028, 2003-06-11.
  • 3Peng Ning, Dingbang Xu. Learning attack strategies from intrusion alerts. The 10th ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., 2003.
  • 4Dan Schnackenberg, Harley Holliday, Randall Smith, et al.Cooperative intrusion traceback and response architecture.DARPA Information Survivability Conference and Exposition(DISCEX II'01), Anaheim, California, 2001.
  • 5Peng Ning, Y. Cui. An intrusion alert correlator based on prerequisites of intrusion. Department of Computer Science,North Carolina State University, Tech. Rep.: TR-2002-01,2002.
  • 6F. Cuppens, A. Miege. Alert correlation in a cooperative intrusion detection framework. The IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
  • 7A. Valdes, K. Skinner. Probabilistic alert correlation. The 4th Int'l Symposium on Recent Advances in Intrusion Detection(RAID 2001), Davis, CA, 2001.
  • 8O. Dain, R. K. Cunningham. Fusing a heterogeneous alert stream into scenarios. The 2001 ACM Workshop on Data Mining for Security Application, Philadelphia, Pennsylvania, 2001.
  • 9Curistis A. Carver, John M. D. Hill, Udo W. Pooch. Limiting uncertainty in intrusion response. The 2nd IEEE Information Assurance and Security Workshop, West Point, NY, 2001.
  • 10Brian Caswell, Jay Beale, James C. Foster, et al. Snort 2.0Intrusion Detection. Sebastopol, CA: Syngress publishing, Inc.,2003.

共引文献112

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部