首页 | 本学科首页   官方微博 | 高级检索  
     

基于多种数据挖掘技术的入侵检测
引用本文:刘轶.基于多种数据挖掘技术的入侵检测[J].山东轻工业学院学报,2008,22(4).
作者姓名:刘轶
作者单位:山东轻工业学院金融职业学院,山东济南 250100
摘    要:计算机系统的复杂和网络数据的海量化,为入侵检测带来了极大的困难.本文在对入侵检测和数据挖掘进行研究的基础上将数据挖掘技术应用到入侵检测中,从提高入侵检测的效率和入侵检测的实用性的角度出发,分别对决策树、关联规则以及序列模式做了详细研究并用它们建立入侵检测系统模型.

关 键 词:入侵检测  数据挖掘  决策树  关联规则  序列模式

Intrusion detection based on a variety of data mining technology
LIU Yi.Intrusion detection based on a variety of data mining technology[J].Journal of Shandong Institute of Light Industry(Natural Science Edition),2008,22(4).
Authors:LIU Yi
Affiliation:LIU Yi (School of Financial Vocation,Sh,ong Institute of Light Industry,Jinan 250100,China)
Abstract:The complication of computer system and huge quantity of network data take great trouble to our intrusion detection.On the basis of research upon intrusion detection and data mining,this paper applies data mining techniques to intrusion detection from the angle of enhancing efficiency and practicality of intrusion detection.The decision tree,association rules and sequence patterns are studied.The intrusion detection system(IDS) model with the three methods is built.
Keywords:intrusion detection  data mining  decision tree  association rules  sequence pattern  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号