期刊文献+

数据挖掘技术在网络攻击检测中的应用 被引量:8

Applying Data Mining to Intrusion Detection Technology
下载PDF
导出
摘要 通过网络攻击检测技术实现网络系统的动态防护已成为网络安全的热门研究课题。该文根据数据挖掘技术和攻击检测的特征,将数据挖掘技术应用于网络攻击检测系统中,从系统审计数据中提取出描述正常和异常行为的特征和规则,从而建立攻击检测模型。 In t hi s paper,data mining is applied to network intrusion detection systems based on characters of network intrusion detection and data mining techniques,and featu res and rules describing the normal and abnormal activities are extracted from a udit data.Thus,intrusion detection models are built.
出处 《计算机工程与应用》 CSCD 北大核心 2002年第11期177-180,共4页 Computer Engineering and Applications
关键词 数据挖掘 网络攻击检测 网络安全 计算机网络 数据库 知识发现 Intrusion Dete ction,Data Mining,Knowledge Discovery,Audit Data
  • 相关文献

参考文献1

二级参考文献7

  • 11,Braachman R, Anand T. Data Archeology. KDD-93,1993.
  • 22,Jaturon Chaattratichat, John Darlington, Moustafa Ghanem. Large Scale Data Mining: The Challenges and Solutions. KDD-97,1997.
  • 33,Gregory Piatetsky Shapiro, Frawley William J. Knowledge Discovery in Databases. AAAI Press, Menlo Park, CA, 1991.
  • 44,Marcel Holsheimer, Arno Siebes. Data Mining: The Search for Knowledge in Databases. Report CS-R9406, CWI,1994.
  • 55,Rakesh Agrawal, Tomasz Imielinski, Arun Swami. Data Mining: A Performance Perspective. IEEE Trans. on Knowledge and Data Engineering, 1993,5(6): 914~925.
  • 66,Rakesh Agrawal, Ramakrishnan Srikant. Fast Algorithms for Mining Association Rules. In Proc. of the 20th Int′1 Conference on Very Large Databases, Santiago, Chile, 1994.
  • 77,Brachman R J. Integrated Support for Data Archeology. In AIII-93 Workshop on Knowledge Discovery in Database, 1993.

共引文献21

同被引文献27

引证文献8

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部