【24h】

Network intrusion detection system model based on data mining

机译:基于数据挖掘的网络入侵检测系统模型

获取原文

摘要

The paper's object is to develop a network intrusion detection model based on data mining technology, which can detect known intrusion effectively and has a good capacity to recognize unknown data schema which can't be detected effectively in traditional IDS. The paper mainly does the following work: by analyzing the intrusion deeply, extract the properties which can reflect intrusion characteristics effectively; combine misuse detection, anomaly detection and human intervention, establish rule library based on C.45 decision tree algorithm and use the optimal pattern matching so as to improve detection rate; the hosts are clustered to be IP group based on visit number by k-means clustering algorithm, the audit data are divided into parts under the IP group's direction, and the classifiers are built up by divided audit data respectively, then the detected Data apply different rules according to their own IP group, thereby reduce false positives. The experiments proved that the method is effective to detect intrusion such as scanning and Deny of Service.
机译:本文的目的是开发一种基于数据挖掘技术的网络入侵检测模型,该模型可以有效地检测已知入侵,并具有识别传统IDS中无法有效检测到的未知数据模式的良好能力。本文的主要工作是:通过对入侵的深入分析,提取出可以有效反映入侵特征的特性。结合误用检测,异常检测和人为干预,建立基于C.45决策树算法的规则库,并使用最优模式匹配,以提高检测率。通过访问均值,通过k-means聚类算法将主机聚类为IP组,在IP组的指导下将审计数据分为几部分,分别通过划分审计数据建立分类器,然后对检测到的数据应用不同的方法。根据自己的IP分组制定规则,从而减少误报。实验证明,该方法能够有效地检测出诸如扫描和拒绝服务等入侵行为。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号