期刊文献+

计算机网络病毒检测的数据挖掘技术应用 被引量:7

Computer network virus detection data mining technology application
原文传递
导出
摘要 现在为了保证网络的安全性,构建计算机网络病毒检测体系颇为需要,而将数据挖掘的技术运用到网络病毒检测中去,是从一种新的角度提高计算机网络安全性的措施。本文首先简单介绍网络病毒的一些特征,再介绍数据挖掘技术,两者结合在一起,探讨网络安全构建新方式。 in order to guarantee the security of the network now,build a computer network virus detection system is needed,and applying the technology of data mining in the network virus detection,from a new Angle to improve the computer network security measures.First,this article introduces some characteristics of network virus,and then introduces data mining technology,the combination of these two together to discuss a new way to build network security.
出处 《网络安全技术与应用》 2014年第11期37-37,39,共2页 Network Security Technology & Application
关键词 计算机 病毒 检测 应用 computer Virus Detection application
  • 相关文献

参考文献4

二级参考文献20

  • 1聂林,张玉清,王闵.入侵防御系统的研究与分析[J].计算机应用研究,2005,22(9):131-133. 被引量:9
  • 2钟秀玉.基于数据挖掘的动态取证技术研究[J].微机发展,2005,15(12):173-176. 被引量:2
  • 3Wenke lee; Stolfo.5.J; K.W.Mok.A Data Mining Framework for Building Intrusion Deteciton Security and Privacy,1999.Proceedings of the 1999 IEEE Symposium
  • 4R.Agrawal,T.Imielinaki,A.Swami.Mining association rules between sets of items in large database In proc of the ACM SIGMOD Conference on Management of Data,1993:207 -216
  • 5David Hand,Heikki Mannila,Padhraic Smyth.Principles of Data Mining
  • 6徐兴元,傅和平,熊中朝.基于数据挖掘的入侵检测技术研究[J].微计算机信息,2007,23(03X):74-75. 被引量:17
  • 7Wenke Lee; Stolfo, S.J., Mok, K.W.; A Data Mining Framework for Building Intrusion Detection Models. Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on 9-12 May 1999:120-132.
  • 8QIN Xin-zhou; Wenke Lee; Lewis, L.; Cabrera, J.B.D.; Integrating Intrusion Detection and Network Management. Network Operations and Management Symposium, 2002.NOMS 2002. 2002 IEEE/IFIP.15-19 April 2002:329-344.
  • 9Agrawal R, Srikant R. Privacy-Preserving Data Mining. In: Weidong C, Jeffrey F, eds. Proc. of the ACM SIGMOD Conf. on Management of Data. Dallas: ACM Press, 2000:439-450.
  • 10Schultz, M.G.; Eskin, E.; Zadok, F.; Stolfo, S.J.;Data Mining Methods for Detection of New Malicious Executables. Security and Privacy, 2001. S&P 2001. PrQceedings. 2001 IEEE Symposium on 14-16 May 2001:38-49.

共引文献44

同被引文献46

引证文献7

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部