首页 | 本学科首页   官方微博 | 高级检索  
     

Application of Data Mining Technology to Intrusion Detection System
引用本文:XIA Hongxia SHEN Qi HAO Rui. Application of Data Mining Technology to Intrusion Detection System[J]. 通讯和计算机, 2005, 2(3): 29-33,55
作者姓名:XIA Hongxia SHEN Qi HAO Rui
作者单位:School of Computer Science and Technology, Wuhan University of Technology, Wuhan 430070, China
摘    要:Based on the analysis of current Intrusion Detection technologies, this paper introduces the Data Mining Technology to the Intrusion Detection System (IDS), and proposes system architecture as well as a pattern strategy of automatic update. By adopting the Data Mining Technology, the frequency patterns can be dug out from a lot of network events. So, effective examination rules can be discovered, which will be used to instruct the analysis of IDS network intrusion. Meanwhile, the usage of the pattern strategy of automatic update that adopts the ways of network real-time analysis intproves the efficiency and the veracity of the mining greatly. The integration of them will be effective in solving the problems of high misreport and false alerts rate in the traditional Intrusion Detection Systems.

关 键 词:侦察技术 数据库 信息技术 计算机技术

Application of Data Mining Technology to Intrusion Detection System
Abstract:
Keywords:Intrusion Detection System   Data Mining   Association Rules   Frequent Episodes
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号