首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于数据挖掘的异常模式入侵检测系统的设计
引用本文:金民锁,孙秀娟,朱单.基于数据挖掘的异常模式入侵检测系统的设计[J].沈阳航空工业学院学报,2008,25(5).
作者姓名:金民锁  孙秀娟  朱单
作者单位:1. 黑龙江科技学院信息网络中心,黑龙江,哈尔滨,150027
2. 黑龙江科技学院数力系,黑龙江,哈尔滨,150027
摘    要:网络攻击的方法是多种多样的,没有标准的分类模式.入侵检测是网络安全领域的一个重要技术,也是当前网络安全理论研究的一个热点.通过分析已知的攻击方法引起的数据异常情况,可以确定用于检测的敏感数据以建立入侵检测系统.

关 键 词:入侵检测系统  网络安全  数据挖掘

Check system design of abnormal pattern invading on data excavation
JIN Min-suo,SUN Xiu-juan,ZHU Dan.Check system design of abnormal pattern invading on data excavation[J].Journal of Shenyang Institute of Aeronautical Engineering,2008,25(5).
Authors:JIN Min-suo  SUN Xiu-juan  ZHU Dan
Institution:1.Information Network Center;Heilongjiang Institute of Science & Technology;Heilongjiang Harbin 150027;2..Department of Mathematics and Mechanics;Heilongjiang Harbin 150027
Abstract:There are many pattern to invade a network,and it is difficult to do standard classification.Invade check is an important technology in network safety field,and is also a hot spot which current network safety theory is focused on.A check system is building up by the fact that sensitive data is being able to be used to check the invading information,which has known the data attacked arise abnormal condition.
Keywords:invading detection system  network security  data excavation  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号