首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于数据挖掘的网络入侵检测系统模型的研究
引用本文:凌昊,谢冬青.基于数据挖掘的网络入侵检测系统模型的研究[J].科学技术与工程,2007,7(19):5170-51725176.
作者姓名:凌昊  谢冬青
作者单位:湖南大学,软件学院,长沙,410082
摘    要:论述了入侵检测系统的基本概念,结合异常检测和滥用检测,提出了基于数据挖掘的网络入侵检测系统模型。介绍了该系统模型的基本思想,该系统模型通过将预处理的网络数据包送到数据挖掘过程控制模块,产生出能精确描述入侵行为和系统正常行为模式的规则,并且自动产生精确适用的检测模型。

关 键 词:网络安全  入侵检测  数据挖掘
文章编号:1671-1819(2007)19-5170-04
修稿时间:2007-06-04

On Intrusion Detection System Model Based on Data Mining
LING Hao,XIE Dong-qin.On Intrusion Detection System Model Based on Data Mining[J].Science Technology and Engineering,2007,7(19):5170-51725176.
Authors:LING Hao  XIE Dong-qin
Institution:Software School, Hunan University, Changsha 410082 ,P. R. China
Abstract:The basic concepts of intrusion detection technique are discussed. Anomaly detection with misuse detection is combined. An intrusion detection system model architecture based on data mining is proposed. The basic theory of the system model is introduced, when the network date packes pretreated are sent to the data mining processing control module, the rules to differentiate intrusion behavior data packets and the normal behavior data packets are described accurately ,then a adaptive intrusion detection model is created automatically.
Keywords:network secur/ty intrusion detection data mining
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号