Description: 入侵检测中的数据挖掘方法研究.pdf-A Research into Data Mining Technology in Intrusion Detection. file type pdf Platform: |
Size: 613768 |
Author:赵艳 |
Hits:
Description: 入侵检测技术已经成为网络安全领域的研究热点。本文介绍了入侵检测的分类以及应用在入侵检测中的数据挖掘方法,并阐述了构建的基于数据挖掘技术的入侵检测系统的设计与实现。-Intrusion Detection Technology network security has become a hot topic. This paper introduces the intrusion detection and the application of the classification in Intrusion Detection Data Mining Methods and expounded on the data mining technology based Intrusion Detection System Design and Implementation. Platform: |
Size: 6753 |
Author:李显 |
Hits:
Description: 入侵检测中的数据挖掘方法研究.pdf-A Research into Data Mining Technology in Intrusion Detection. file type pdf Platform: |
Size: 613376 |
Author:赵艳 |
Hits:
Description: 关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境下的关联规则挖掘算法;多值属性关联规则挖掘;关联规则更新算法;基于约束条件的关联规则挖掘;关联规则并行及分布挖掘算法等。-Association rule mining research work include: Apriori algorithm for the expansion of the number of association rules mining, incremental updating of association rules, there is no need to generate candidate itemsets of association rule mining, maximal frequent itemsets mining, association rule mining binding, as well as parallel and Distribution of association rule mining algorithm, one of the rapid mining frequent itemsets and updating of association rules mining are the focus of the study, but also a variety of data mining technology in key applications, has been used in classification rules mining and network intrusion detection studies. The researchers also carried out the theory of data mining has made useful explorations, to concept lattice and rough sets in association rule mining applied to obtain significant results. So far, the mining association rules has made remarkable achievements, including: stand-alone environment for mining association rules algorithm many associatio Platform: |
Size: 2056192 |
Author:henry |
Hits:
Description: 关联规则论文:
GP在入侵检测规则提取中的适应度函数设计.pdf
采用数据挖掘的入侵检测技术研究.pdf
分类规则挖掘算法综述.pdf
-Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pdf Classification Rule Mining Algorithm. Pdf Platform: |
Size: 1308672 |
Author:yxm |
Hits:
Description: 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的
审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人
的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实
验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system based on data mining is proposed, and its main idea is to apply data mining
methods to learn rules that can capture normal and intrusion activities from pre- processed audit data that contain network connection
information. Put forward a method to improve the Apriori algorithm, whose I/O is quite surprising when scanning the database.
To improve the method is feasible the normal rules in the knowledge database in IDS are mined. And the experiment indicates that
the model can produce new rules, which approve the validity and the feasibility of the IDS. Platform: |
Size: 207872 |
Author:youby |
Hits:
Description: An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used
by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The
Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a commandbased
intrusion detection system Platform: |
Size: 217088 |
Author:keerthi |
Hits:
Description: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today s commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98 detection rate (DR) in comparison with
other existing methods.-Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today s commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98 detection rate (DR) in comparison with
other existing methods. Platform: |
Size: 312320 |
Author:keerthi |
Hits:
Description: In Information Security, intrusion detection is the act
of detecting actions that attempt to compromise the confidentiality,
integrity or availability of a resource. Intrusion detection does not,
in general, include prevention of intrusions. In this paper, we are
mostly focused on data mining techniques that are being used for
such purposes. We debate on the advantages and disadvantages
of these techniques. Finally we present a new idea on how data
mining can aid IDSs. Platform: |
Size: 372736 |
Author:keerthi |
Hits:
Description: There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS appliance).
In this paper, a host based intrusion detection system, that uses the
idea of tracing system calls, is introduced. As a program runs, it
uses the services of the underlying operating system to do some
system calls. This system does not exactly need to know the
program codes of each process. Normal and intrusive behaviors are
collected with gathering the sequences of system calls for each
process. Analysis of data is done via data mining and fuzzy
techniques. Data mining is used to extract normal behaviors
(normal unique rules) and Fuzzy to enhance intelligence of the
System. The proposed system is shown to improve the
performance, and decrease size of database, time complexity, and
rate of false alarms.-There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS appliance).
In this paper, a host based intrusion detection system, that uses the
idea of tracing system calls, is introduced. As a program runs, it
uses the services of the underlying operating system to do some
system calls. This system does not exactly need to know the
program codes of each process. Normal and intrusive behaviors are
collected with gathering the sequences of system calls for each
process. Analysis of data is done via data mining and fuzzy
techniques. Data mining is used to extract normal behaviors
(normal unique rules) and Fuzzy to enhance intelligence of the
System. The proposed system is shown to improve the
performance, and decrease size of database, time complexity, and
rate of false alarms. Platform: |
Size: 710656 |
Author:keerthi |
Hits:
Description: 针对现有入侵
检测系统的不足,对数据挖掘技术和智能检测代理应用于入侵检测系统进行了研究,提出一个基于数据挖掘技
术的智能入侵检测系统模型-Intrusion detection system for the existing shortage of data mining and intelligent detection agents used in intrusion detection systems have been studied, proposed a data mining technology based on Intelligent Intrusion Detection System Platform: |
Size: 246784 |
Author:shenren |
Hits:
Description: In recent years and within the intrusion detection
domain, an increasingly evident trend has emerged.
The trend stands within the crossroads of multi-agent systems and data mining. The documents present some related works introducing distributed intrusion detection architectures using the multi-agent design methodology and the data mining techniques.-In recent years and within the intrusion detection
domain, an increasingly evident trend has emerged.
The trend stands within the crossroads of multi-agent systems and data mining. The documents present some related works introducing distributed intrusion detection architectures using the multi-agent design methodology and the data mining techniques. Platform: |
Size: 6524928 |
Author:i |
Hits:
Description: The problem of intrusion detection has been studied and received a lot of attention in
machine learning and data mining in the literature survey. The existing techniques are not
effective to improve the classification accuracy and to reduce high false alarm rate.
Therefore, it is necessary to propose new technique for IDS. In this work, we propose a
new K-means clustering method with a different Preprocessing and Genetic Algorithm
for identifying intrusion and classification for both anomaly and misuse.
The experiments of the proposed IDS are performed with KDD cup’99 data set. The
experiments will clearly results the proposed method provides better classification
accuracy over existing method. Platform: |
Size: 400384 |
Author:Sumit |
Hits:
Description: 本文前三章分别简要介绍信息安全,入侵检测和安全日志的相关
概念和基本原理;第四章重点介绍数据挖掘技术,包括了关联规则分
析,序列分析,分类分析和聚类分析;第五章论证数据挖掘技术应用
于入侵检测系统的必要性和实施的系统架构;第六章详细说明实验流
程和实验过程中对关联规则算法的改进,其中重点研究了运用 K-均
值算法对审计日志做预处理和在实现关联规则挖掘时,如何改进
Apriori 算法,使之能在面对安全日志这种高维度数据时比原有算法
效率获得大幅度提高;-This article briefly describes the first three chapters were related to information security, intrusion detection, and security logs
The basic concepts and principles chapter focuses on data mining technology, including a sub-association rules
Analysis, sequence analysis, classification and clustering analysis Chapter demonstrate the application of data mining techniques
On the necessity of the intrusion detection system and system architecture implementation flow experiments described in detail in Chapter VI
Cheng and experiment to improve the algorithm of association rules, which are focused on the use of K-
Value preprocessing algorithm for audit logs and in the realization of association rule mining, the ways to improve
Apriori algorithm, so that it can log in the face of such high-dimensional data security than the original algorithm
Obtain greatly improved efficiency Platform: |
Size: 953344 |
Author:路粮户 |
Hits:
Description: 本文围绕入侵检测系统进行了深入细致的研究,介绍了入侵检测的研究进展,
分析了入侵检测系统的特征、结构和分类,分析了入侵检测系统的发展方向以及
在入侵检测中常用的数据挖掘方法,深入研究了聚类技术在入侵检测系统中的应
用,并对系统性能做出评估-This paper focuses on the intrusion detection system has been studied intensively, research progress intrusion detection,
Analysis of the characteristics, structure and classification of intrusion detection system, analyzes the development direction of intrusion detection systems and
Commonly used in intrusion detection data mining method, in-depth study of clustering technology in Intrusion Detection System
Use, and assess system performance Platform: |
Size: 993280 |
Author:路粮户 |
Hits: