首页 | 本学科首页   官方微博 | 高级检索  
     

基于数据挖掘的入侵检测技术研究
引用本文:徐兴元,傅和平,熊中朝.基于数据挖掘的入侵检测技术研究[J].微计算机信息,2007,23(3X):74-75,122.
作者姓名:徐兴元  傅和平  熊中朝
作者单位:洛阳师范学院,河南洛阳471022
基金项目:河南省自然科学基金项目(项目编号:0411010300)
摘    要:当今社会信息安全问题引起了人们的广泛关注。本文介绍了入侵检测的重要性以及传统入侵检测的类型和局限性,指出利用数据挖掘技术可以克服这些局限性。本文给出了数据挖掘技术的定义、入侵检测模型数据挖掘过程、基于数据挖掘的入侵检测框架.最后指出了需要继续研究的几个热点问题。

关 键 词:入侵检测  数据挖掘  信息安全
文章编号:1008-0570(2007)03-3-0074-02
修稿时间:2007-02-032007-03-05

Intrusion Detection Technology Research Based on Data Mining
XU XINGYUAN FU HEPING XIONG ZHONGCHAO.Intrusion Detection Technology Research Based on Data Mining[J].Control & Automation,2007,23(3X):74-75,122.
Authors:XU XINGYUAN FU HEPING XIONG ZHONGCHAO
Abstract:Information security has aroused extensive interests. This paper introduces the importance of intrusion detection as well as types of traditional intrusion detection and their limitations, points out that data mining technology may overcomes these limitations. The definition of data mining technology, data mining process of the intrusion detection model, intrusion detection frame based on the data mining are presented, several hot topics that needs further study are pointed out in the end.
Keywords:intrusion detection  data mining  information security
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号