首页 | 本学科首页   官方微博 | 高级检索  
     

网络安全审计系统的实现方法
引用本文:王伟钊,李承,李家滨.网络安全审计系统的实现方法[J].计算机应用与软件,2002,19(11):24-26,61.
作者姓名:王伟钊  李承  李家滨
作者单位:上海交通大学计算机科学与工程系,上海,200030
摘    要:本文主要介绍了基于网络的安全审计系统的传统常用方法以及其适用场合和不足,并讨论了如何将有学习能力的数据挖掘技术应用到安全审计系统中去。

关 键 词:网络安全审计系统  入侵检测  规则匹配  数理统计  数据挖掘  计算机网络

AN APPROACH TO NETWORK BASED SECURITY AUDITING SYSTEM
Wang Weizhao Li Chen Li Jiabin.AN APPROACH TO NETWORK BASED SECURITY AUDITING SYSTEM[J].Computer Applications and Software,2002,19(11):24-26,61.
Authors:Wang Weizhao Li Chen Li Jiabin
Abstract:In the first place of this article, a variety of Network Based Security Auditing Systems are introduced, and the applicable cases as well as the deficiencies of each are discussed. Besides these common methods, the data mining technology, which possesses the learning abihty, can be applied to the security auditing system. It is a new approach that we discuss in detail in this paper.
Keywords:Intrusion detection Security auditing Rules match Logistic statistics Data mining  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号