...
首页> 外文期刊>IEEE transactions on network and service management >Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process
【24h】

Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process

机译:网络入侵检测方法从数据库过程中知识发现视角调查

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The identification of network attacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a complex problem which presents a diverse number of challenges. Many attacks currently remain undetected, while newer ones emerge due to the proliferation of connected devices and the evolution of communication technology. In this survey, we review the methods that have been applied to network data with the purpose of developing an intrusion detector, but contrary to previous reviews in the area, we analyze them from the perspective of the Knowledge Discovery in Databases (KDD) process. As such, we discuss the techniques used for the collecion, preprocessing and transformation of the data, as well as the data mining and evaluation methods. We also present the characteristics and motivations behind the use of each of these techniques and propose more adequate and up-to-date taxonomies and definitions for intrusion detectors based on the terminology used in the area of data mining and KDD. Special importance is given to the evaluation procedures followed to assess the detectors, discussing their applicability in current, real networks. Finally, as a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
机译:识别目标信息和通信系统的网络攻击多年来一直是研究界的焦点。网络入侵检测是一个复杂的问题,它呈现了多种挑战。目前许多攻击仍未被发现,而较新的攻击因连接设备的扩散和通信技术的演变而出现。在本调查中,我们审查了应用于网络数据的方法,目的是开发入侵探测器,但与此区域的之前的评论相反,我们将它们分析它们在数据库(KDD)过程中的知识发现的角度来看。因此,我们讨论了用于聚集的技术,预处理和转换数据,以及数据挖掘和评估方法。我们还介绍了使用这些技术的使用背后的特点和动机,并提出了基于数据挖掘领域和KDD领域的术语的入侵探测器的更充足和最新的分类和定义。特别重要的评估程序,然后遵循评估探测器,讨论其在当前的实际网络中的适用性。最后,由于这种文献综述,我们调查了一些开放问题,需要考虑在网络安全领域进一步研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号