首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于云计算的模糊规则挖掘算法在入侵检测中的应用
引用本文:魏德志,吴旭,林丽娜,王奇光.基于云计算的模糊规则挖掘算法在入侵检测中的应用[J].吉林师范大学学报(自然科学版),2012(1):115-118.
作者姓名:魏德志  吴旭  林丽娜  王奇光
作者单位:集美大学诚毅学院
基金项目:福建省仿脑智能系统重点实验室开放课题项目(BLISSOS2010103)
摘    要:提出了一种基于云计算的模糊规则挖掘算法的入侵规则检测方法.以模糊集理论为基础,提出了在入侵关联规则挖掘中将特征属性模糊集作为单一属性来处理的模糊规则挖掘算法,有效地解决入侵规则中出现不相关规则和"尖锐边界"等问题.在云计算平台上进行算法的验证,利用云计算平台可进行大规模计算和数据处理的特点,得出该思想在入侵检测具有较好的应用效果和前景.

关 键 词:云计算  入侵检测  模糊规则  数据挖掘

Fuzzy Mining Algorithm for Rules Based on Cloud Computing in Intrusion Detection
WEI De-zhi,WU Xu,LIN Li-na,WANG Qi-guang.Fuzzy Mining Algorithm for Rules Based on Cloud Computing in Intrusion Detection[J].Jilin Normal University Journal(Natural Science Edition),2012(1):115-118.
Authors:WEI De-zhi  WU Xu  LIN Li-na  WANG Qi-guang
Institution:(Chengyi College,Jimei University,Xiamen 361021,China)
Abstract:The paper proposed a intrusion detection method that fuzzy mining algo rithm for rules based on cloud computing.Based on fuzzy set theory,proposed formining association rules in the invasion properties of fuzzy sets will feature as a single property to handle the fuzzy rules mining algorithm,that is a effe ctive solution to the rule that there is no invasion of the relevant rules and t he "sharp boundary" issues.In the cloud computing platform for the validation algorithm,with the features of large-scale computing and data processing on clo ud computing platform,the ideas in intrusion detection obtained good results an d prospects of application.
Keywords:cloud computing  intrusion detection  fuzzy rules  data mining
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号