首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于模糊关联规则挖掘的攻击识别系统
引用本文:朱可,胡克瑾. 一种基于模糊关联规则挖掘的攻击识别系统[J]. 计算机工程与应用, 2007, 43(1): 135-138
作者姓名:朱可  胡克瑾
作者单位:同济大学,经济与管理学院,上海,200092;同济大学,经济与管理学院,上海,200092
摘    要:降低攻击识别中的漏报率和误报率是现在一个急需解决的问题。论文分析了攻击识别的需求与模糊关联规则挖掘的有关概念,并且以此为基础构建了一个攻击识别系统。该系统不但能够很好地满足攻击识别的要求,而且还能同时对异常攻击和滥用攻击进行识别,并且在很大程度上降低了攻击识别中的漏报率和误报率,极大地增强了信息系统的生存力。

关 键 词:攻击识别  模糊关联规则  模糊逻辑
文章编号:1002-8331(2007)01-0135-04
修稿时间:2006-08-01

System for attack recognition based on mining fuzzy association rules
ZHU Ke,HU Ke-jin. System for attack recognition based on mining fuzzy association rules[J]. Computer Engineering and Applications, 2007, 43(1): 135-138
Authors:ZHU Ke  HU Ke-jin
Affiliation:School of Economics and Management,Tongji University,Shanghai 200092,China
Abstract:It is an imperative issue that reduces the false negative rate and false positive rate in attack recognition.This literature analyses the requirements for attack recognition and the relevant concepts about the mining of fuzzy association rules,and then sets up a system for attack recognition.This system not only satisfies the requirements for attack recognition perfectly,but also recognizes the anomaly-based attacks and the misuse-based attacks simultaneously.Furthermore,it reduces the false negative rate and false positive rate in attack recognition in some extents and greatly enhances the survivability of the information systems.
Keywords:attack recognition  fuzzy association rules  fuzzy logic
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号