摘要: 介绍了入侵检测技术的分类以及数据挖掘技术在入侵检测中的应用,并阐述了构建的基于数据挖掘算法RIPPER的异常入侵检测系统的设计与实现.
[1] Wenke Lee,Salvatore J Stolfo.Learning patterns from unix process execution traces for intrusion detection. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management[C], AAAI Press . 1997[2] William W,Cohen.Fast effective rule induction. In Machine Learning: Proceeding of the Twelfth International Conference . 1995[3] Warrender C,Forrest S,Pearlmutter B.Detecting intrusion using system calls: alternative data modles. Proceedings of 1999 IEEE Symposium on Computer Security and Privacy . 1999[4] Hofmeyr S A,Foreest S,Somayaji A.Intrusion detection using sequences of system Calls. Journal of Computer Security . 1998[5] Sung-Bae Cho,Hyuk-Jang Park.Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computer & Science . 2003[6] Foreest S,Hofmeyr S A,Somayaji A.A sense of self for unix process. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy . 1996[7] Ghosh A K,Schwartzbard A,Shatz A M.Learning program behavior profiles for intrusion detection. Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring . 1999 |
No related articles found! |
|