Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Haidian University》 2005-02
Add to Favorite Get Latest Update

The Design of Data Mining Based on the Intrusion Detection System Model Architecture

Peng Ru  
Intrusion detection is an important technology in network security domain, and it is a hot spot of network security theory researching in recent years. In this paper, a data mining based on the intrusion detection system model architecture called DMIDS is proposed. The basic theory of the system model is introduced, and its structure and main function are expounded, and data mining processing is analyzed.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 Qin Aiming Hu Changzhen Tan Huimin(School of Mechanical and Electronic Eng ineering,Beijing Institute of Technology,Beijing100081);Applying Data Mining to Intrusion Detection Technology[J];Computer Engineering and Applications;2002-11
2 Zhao Haibo, Li Jianhua, Yang Yuhang Department of Electronic Engineering, Shanghai Jiaotong University, China;Network Intrusion Intelligent Real Time Detection System[J];JOURNAL OF SHANGHAI JIAOTONG UNIVERSITY;1999-01
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Wen Xiaodong Huang Ronghuai Shen Changning Wang Lang Yao Jiqing (Information Science College, Beijing Normal University, 100875, Beijing, China);DEVELOPMENT OF A SNORT-BASED SECURITY NETWORK MANAGEMENT AND REAL-TIME INTRUSION DETECTION SYSTEM[J];Journal of Beijing Normal University(Natural Science);2004-01
2 LI Ke-ling(Computer Science and Technology Institute,Changchun University,Changchun 130022,China);Study on intrusion detection technology[J];Journal of Changchun University;2007-06
3 TANG Yang,XU Qian(1.College of Computer Science of Chongqing University,Chongqing 400044,China;2.Chongqing Electric Power College,Chongqing 400053,China);The Recognition and Defenses of Network Intrusion Detection via Exceptional Operations[J];Journal of Chongqing Electric Power College;2008-01
4 ZHANG Min and LUO Guang-chun (Information Center, University of Electronic Science and Technology of China Chengdu 610054);IDMEF-Based Architecture of Large-Scale Cooperative IDS System[J];Journal of University of Electronic Science and Technology of China;2009-02
5 HE Minwei1,2(1.School of Information,Guangdong University of Business Studies,Guangzhou 510320,China;2.School of Economics & Management,Beijing University of Aeronautics & Astronautics,Beijing100083,China);Application of improved BP algorithm in intrusion detection technology[J];Journal of Liaoning Technical University(Natural Science);2008-S1
6 PU Jie-xin; XUE Bing-bing (Electro-Information & Engineering School, Henan University of Science and Technology, Luoyang 471003, China);The application of weighted association rules in network intrusion detection[J];Information Technology;2004-04
7 LIU Xue-Jun, CHEN Song-Can, and PENG Hong-Jing (Department of Computer Science and Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016);COMPUTER KEYSTROKER VERIFICATION BASED ON SUPPORT VECTOR MACHINES[J];Journal of Computer Research and Development;2002-09
8 Yan Hui,Long Duo ( Changchun University of Science and Technology, Changchun Jilin 130022, China);Optimized ES by ANN in IDS[J];;2004-03
9 Huang Chenlin Zhao Hui Hu Huaping (College of Computer Science,National University of Defense Technology,Changsha 410073);A Hierachical Intrusion Detection System Based on Distributed Autonomous Agents[J];Computer Engineering and Applications;2001-06
10 Xia Yu Lang Rongling Dai Guanzhong(Northwestern Polytechnical University,Xi'an710072);Research on Detect Technology of Intrusion Detection System[J];Computer Engineering and Applications;2001-24
China Proceedings of conference Full-text Database 1 Hits
1 Li Lianjun Yu hongmin Yuan Hongtao Li Xiongwei Chen Zhiming Ordnance Engineering College Doctor team Shijiazhuang,Hebei 050003;Research of Structure of Intrude-detecting System Based on C~3I System[A];[C];2001
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 SUN Xiu Computer Center, liaodong Institute,Dandong 118003, China;The Applications of Searching Engine on Web's Data Mining[J];Dandong Textile College;2004-01
2 RUAN Zhong (Computer and Control Department, Guilin Institute of Electronic Technology, Guilin 541004, China);The Research and Design for Intrusion Detection System Combined Honeypot Technology[J];Computer Knowledge and Technology;2008-04
3 WANG Guang-sheng (Hubei Ecology Vocational College, Wuhan 430200, China);Discussion on Design and Establishment of Intrusion Detection System[J];Journal of Hubei Ecology Vocational College;2006-03
4 Chen Peng Lü Weifeng Shan Zheng(National Lab.of Software Development Environment,Beijing University of Aeronautics andAstronautics,Beijing 100083);Network-based Intrusion Detection Approach:A Survey[J];Computer Engineering and Applications;2001-19
5 Wang Xinmei1 Lu Wei2 Yin Chaoqing1 Lü Yabing11(Dept. of Computer Science & Technology,Wuhan University of Technology,Wuhan 430063)2(Public Security Bureau of Wuhan,Wuhan 430022);The Classification and Filtering of Email Based on Text Mining[J];Computer Engineering and Applications;2006-02
6 XUE Jingfeng,CAO Yuanda (Department of Computer Science and Engineering, Beijing Institute of Technology, Beijing 100081);Intrusion Detection Based on Data Mining[J];Computer Engineering;2003-09
7 ZHANG Xing-dong,HU Hua-ping .KUANG Xiao-hui,CHEN Hui-zhong (1 .School of Computer Science, National University of Defense Technology, Changsha 410073; 2.PLA Corps 96401 ,Baoji 721006;3.Guangdong Beim Infotech Project Co. Ltd,Guangzhou 510655,China);Research and Implementation of the Interaction with Firewalls and IDSs[J];Computer Engineering & Science;2004-04
8 Shen Jun,Song Wei (School of Information Engineering, Zhengzhou 450052);A Design Scheme of Honeypot for Defend Unknown Worm[J];Science & Technology Information;2007-23
9 HONG Long~(1,2 ),CHEN Yan-li~1,WANG Jian-dong~2,ZHU Wu-jia~2 1.Department of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China 2.College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China;Density-based Clustering Structure and Its Algorithm Design for Data Mining[J];Journal of Nanjing Institute of Posts and Telecommunications(Natural Science);2003-04
10 HU Kan\ XIA Shao wei(Department of Automation\ Tsinghua University\ Beijing\ 100084);Large Data Warehouse based Data Mining: a Survey[J];JOURNAL OF SOFTWARE;1998-01
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 WANG Hong-chao,CHEN Wei-ru,LIU Jun(Dept.of Computer Science and Technology,Shenyang Institute of ChemicalTechnology,Shenyang 110142,China);Research of Commodity Recommendation System Based on Customer Clustering[J];Computer Technology and Development;2008-07
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Chen Fuzan Kou Jisong Wang Yizhi Institute of Systems Engineering, Tianjin University, 300072;The Research of Methods in Data Mining[J];Systems Engineering and Electronics;2000-08
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved