首页 | 本学科首页   官方微博 | 高级检索  
     

基于图的数据挖掘在入侵检测系统中的应用
引用本文:吴师鹏,欧阳为民,陈宁宇,徐春荣.基于图的数据挖掘在入侵检测系统中的应用[J].计算机工程与设计,2005,26(6):1651-1653.
作者姓名:吴师鹏  欧阳为民  陈宁宇  徐春荣
作者单位:上海大学,计算机学院,上海,200072
摘    要:网络入侵检测系统(IDS)是保障网络安全的有效手段,但目前的入侵检测系统仍不能有效识别新型攻击,根据国内外最新的图数据挖掘理论,设计一个特征子图挖掘算法,并将其应用到入侵检测系统中,该算法挖掘出正常的特征子结构,与之偏离的子结构为异常结构。实验结果表明,该系统在识别新型攻击上具有较高检测率。

关 键 词:  数据挖掘  网络安全  入侵检测
文章编号:1000-7024(2005)06-1651-03

Graph-based data mining for intrusion detection system
WU Shi-peng,OUYANG Wei-min,CHEN Ning-yu,XU Chun-rong.Graph-based data mining for intrusion detection system[J].Computer Engineering and Design,2005,26(6):1651-1653.
Authors:WU Shi-peng  OUYANG Wei-min  CHEN Ning-yu  XU Chun-rong
Abstract:Intrusion Detection Systems (IDS) are developing very rapid in recent years, while the networks are being used widely. But most of traditional IDS can't detecting new attacks. Graph-based data mining is a subject that occurred in the past few years. Based on the theory of graph-based data mining, an algorithm of mining the substructures of a graph was designed, and it was applitd into IDS. It can mine normal pattern from graph data. The result of experiment shows that it can detect new attacks efficiently.
Keywords:graph  data mining  network security  intrusion detection  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号