当前位置:
首页 资源下载
搜索资源 - Data Mining Intrusion Detection
搜索资源列表
-
0下载:
基于数据挖掘的入侵检测系统的设计与实现
基于数据挖掘的入侵检测系统的设计与实现-Based on Data Mining Intrusion Detection System Design and Implementation Based on Data Mining Intrusion Detection System Design and Implementation
-
-
0下载:
入侵检测中的数据挖掘方法研究.pdf-A Research into Data Mining Technology in Intrusion Detection. file type pdf
-
-
0下载:
入侵检测技术已经成为网络安全领域的研究热点。本文介绍了入侵检测的分类以及应用在入侵检测中的数据挖掘方法,并阐述了构建的基于数据挖掘技术的入侵检测系统的设计与实现。-Intrusion Detection Technology network security has become a hot topic. This paper introduces the intrusion detection and the application of the classification in Intru
-
-
1下载:
关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
-
-
0下载:
基于数据挖掘技术的入侵检测系统的设计思路与模型,以及改进思路-Based on Data Mining Intrusion Detection System Design and model, as well as ideas to improve
-
-
0下载:
关联规则论文:
GP在入侵检测规则提取中的适应度函数设计.pdf
采用数据挖掘的入侵检测技术研究.pdf
分类规则挖掘算法综述.pdf
-Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pd
-
-
0下载:
本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的
审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人
的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实
验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system
-
-
0下载:
An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the te
-
-
0下载:
Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employ
-
-
0下载:
In Information Security, intrusion detection is the act
of detecting actions that attempt to compromise the confidentiality,
integrity or availability of a resource. Intrusion detection does not,
in general, include prevention of intrusions. In
-
-
0下载:
There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS applia
-
-
0下载:
基于数据挖掘的智能入侵检测系统研究,提出了一个基于数据挖掘、Agent技术的入侵检测系统框架-Intelligent data mining-based intrusion detection system, proposed based on data mining, Agent Intrusion Detection System
-
-
0下载:
针对现有入侵
检测系统的不足,对数据挖掘技术和智能检测代理应用于入侵检测系统进行了研究,提出一个基于数据挖掘技
术的智能入侵检测系统模型-Intrusion detection system for the existing shortage of data mining and intelligent detection agents used in intrusion detection systems have been studied, proposed a data min
-
-
0下载:
In recent years and within the intrusion detection
domain, an increasingly evident trend has emerged.
The trend stands within the crossroads of multi-agent systems and data mining. The documents present some related works introducing distributed
-
-
0下载:
The problem of intrusion detection has been studied and received a lot of attention in
machine learning and data mining in the literature survey. The existing techniques are not
effective to improve the classification accuracy and to reduce high
-
-
0下载:
Mining network data for intrusion detection through combining SVM
with ant colony
-
-
0下载:
Intrusion Detection System Using Data Mining Technique: Support Vector Machine
-