首页 | 本学科首页   官方微博 | 高级检索  
     

基于数据挖掘的入侵检测系统设计与研究
引用本文:蒋定定,张忠民,张国栋.基于数据挖掘的入侵检测系统设计与研究[J].军民两用技术与产品,2007(6):26-27,50.
作者姓名:蒋定定  张忠民  张国栋
作者单位:海军航空工程学院青岛分院,青岛,266041
摘    要:网络攻击工具与手段日趋复杂多样,单纯的防火墙策略已经无法满足对安全高度敏感部门的需要。提出了一种基于数据挖掘的网络数据库入侵检测系统,利用关联规则算法,对用户正常历史数据进行挖掘,并对产生的规则进行归并更新,通过训练学习生成检测模型,并利用此模型实现基于数据挖掘的入侵检测。

关 键 词:数据挖掘  入侵检测  关联规则  序列规则  网络安全
文章编号:1009-8119(2007)06-0026-02

According to what data scoop out invade to examine the system the design and research
Jiang dingding,Zhang zhongmin,Zhang guodong.According to what data scoop out invade to examine the system the design and research[J].Universal Technologies & Products,2007(6):26-27,50.
Authors:Jiang dingding  Zhang zhongmin  Zhang guodong
Affiliation:Naval Aeronautical Engineering Institute Qingdao Branch, Qingdao 266041
Abstract:Fire wall strategy that network attack the tool and means gradually sophisticate the variety, pure have already satisfied the section's demand towards safety high degree sensitive.This text bring ups a network database for base onning data scoop outing to invade to examine the system, and make use of the connection rule the calculate way, and proceeds to scoop out to normal history data of customer, and combine to proceeds to merge to renew to output rule, and pass to train to study the born examination model, and make use of this model to realize according to what data scoop out invade examination, and the text behind imitate establishing of clear that system of true verification to not depend on in the experience, and have the stronger and vivid.
Keywords:The data scoop outs  Invade the examination  Connection rule  Preface row rule  Network safety
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号