首页 | 本学科首页   官方微博 | 高级检索  
     

数据挖掘方法在网络入侵检测中的应用
引用本文:章金熔,刘峰,赵志宏,骆斌.数据挖掘方法在网络入侵检测中的应用[J].计算机工程与设计,2009,30(24).
作者姓名:章金熔  刘峰  赵志宏  骆斌
作者单位:南京大学软件学院,江苏,南京,210089
基金项目:国家自然科学基金项目,江苏省高新技术研究计划基金项目 
摘    要:传统的入侵检测系统存在适应性差、缺乏可扩展性、需要专家手工编码等缺陷.基于数据挖掘的入侵检测技术,自动地从训练数据中提取出入侵检测的知识和模式,能够很好地解决传统入侵检测系统中存在的问题.综述了数据挖掘技术在网络入侵检测中的应用,描述了基于数据挖掘的入侵检测系统架构,阐述了聚类分析、分类分析、关联规则分析和序列模式分析在网络入侵检测中的应用原理和最新的研究与改进,并指出了目前存在的问题和未来研究的方向.

关 键 词:入侵检测  分类  聚类  关联规则  频繁情节规则

Applications of data mining to network intrusion detection
ZHANG Jin-rong,LIU Feng,ZHAO Zhi-hong,LUO Bin.Applications of data mining to network intrusion detection[J].Computer Engineering and Design,2009,30(24).
Authors:ZHANG Jin-rong  LIU Feng  ZHAO Zhi-hong  LUO Bin
Abstract:There are many problems such as poor adaptability, limited extensibility and experts hand-coding in traditional intrusion detection systems. Data mining-based intrusion detection techniques can extract knowledge and patterns of abnormal intrusions and normal user profiles from training data automatically, hence resolving the problems of tradition IDS properly. Main applications of data mining to network intrusion detection are surveied, i.e. clustering analysis, classification analysis, association rule analysis and sequential patterns analysis. Basic principles of each as well as latest research and improvements. At last, a summary of existing problems and future research directions is given.
Keywords:intrusion detection  classification  clustering  associate rule  frequent episode rule
本文献已被 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号