Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Daqing Petroleum Institute》 2006-01
Add to Favorite Get Latest Update

Application of data mining method for intrusion detection system

YI Zhi-an~1,LI Nan~1,PENG Min~2(1.College of Computer and Information Technology,Daqing Petroleum Institute, Daqing,Heilongjiang 163318,China;2.Library,Daqing Petroleum Institute,Daqing,Heilongjiang 163318,China)  
This paper introduces the concept and the technical method of the intrusion detection,compares the advantage and the deficiency of the anomaly detection and the misuse detection,and explores the application of the data mining technology in the way of anomaly detection.Then this paper studies the association analysis,the sequence mode analysis and the classification analysis methods about how to cooperate with others in the intrusion detection system.Through mining the user behavior mode,we get intrusion rules.
【Fund】: 黑龙江省研究生创新科研资金项目(YJSCX2006-38HLJ)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 LI Hao1,ZHOU Zhen-hua2(1.Finance and Planning Dept.,Harbin University of Science and Technology,Harbin,Heilongjiang 100000,China;2.College of Chemical and Environmental Engineering,Harbin University of Science and Technology,Harbin,Heilongjiang 100000,China);Early warning system for college students' records based on the data mining[J];Journal of Daqing Petroleum Institute;2011-04
【Citations】
Chinese Journal Full-text Database 2 Hits
1 SONG Shi-jie,HU Hua-ping,HU Xiao-lei (School of Computer Science, National University of Defense Technology, Changsha, 410073, China);Application of association rules and sequence patterns algorithm to IDS[J];Journal of Chengdu University of Information Technology;2004-01
2 Liu Junling,Wu Xiaoyu ,Cao Yan (Changchun University of Technology, Changchun Jilin 130012,China);Technology of using association analysis to improve signature-based intrusion detection[J];;2004-12
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Wang Song - he Ren Lian - xing;Intrusion Detection System (IDS) And Intrusion Prevention Systcm(IPS)[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 SONG Ping-ping(Hefei University of Technology,Hefei 230009,China);Intelligent intrusion detection system model and realization based on data mining[J];Journal of Anhui University of Technology and Science(Natural Science);2006-03
3 LI Cui-mei(School of Computer and Information,Heifei University of Technology,Hefei 230009,China);Snort invades model and its use in LAN[J];Journal of Anhui Technical College of Water Resources and Hydroelectric Power;2010-01
4 ZHANG Li1,2,PENG Xiao-feng2(1.College of Computer Science,Chongqing University,Chongqing 400044,China;2.College of Electronic Information and Automation,Chongqing Institute of Technology,Chongqing 400050,China);Application of Data Mining in Network Intrusion Detection System[J];Journal of Chongqing Institute of Technology(Natural Science);2008-08
5 YANG Shi-en,CHEN Chun-mei(Southwest University of Science and Technology,Mianyang 621010);Research on the System of SVM-based Network Attacks Detection[J];Journal of Yangtze University(Natural Science Edition);2011-08
6 CHEN Hong-jun,WANG Yan-ling(Pingdingshan Institution of Technolgy,Pingdingshan 467001,China);Application of data mining technology in IDS[J];Journal of Pingdingshan Institute of Technology;2005-06
7 SHEN Li-xiang1 CAO Guo2(1.School of Computer & Information Engineering,Changzhou Institute of Technology,Changzhou 213002; 2.School of Economics & Management,Changzhou Institute of Technology,Changzhou 213002);Research of an Intrusion Detection Multi-classification Model Based on Data Mining[J];Journal of Changzhou Institute of Technology;2011-06
8 Ma Ling Meng Qingxin;Research on Intrusion Detection System Based on Data Mining[J];Computer Study;2009-04
9 MING Yong(Chengdu Radio and TV University,Chengdu 610051,China);Research on Application of Data-Mining-Based Apriori algorithm in the Intrusion Detection[J];Computer Knowledge and Technology;2005-35
10 WANG Biao1,2(1.School of Computer,Huazhong University of Science & Technology,Wuhan 430074,China;2.Jingmen Technical college,Jingmen 448000,China);Research and Implement of Intrusion Detection Based on Network[J];Computer Knowledge and Technology;2006-14
China Proceedings of conference Full-text Database 3 Hits
1 ;The Design of Network Intrusion Detection System in Linux based on Artiifcial Intelligence[A];[C];2009
2 Sun He-kai,Wei Hai-ping (School of Computer and communication engineering,Liaoning Shihua University,Liaoning Fushun 113001,China);THE RESEARCH ON INTRUSION DETECTION BASED ON ARTIFICIAL IMMUNE THEORY[A];[C];2010
3 ;Data Mining Oriented Intrusion Detections:Studies and Developments[A];[C];2007
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 WU Hai-feng1,2,HU Xue-gang1(1.School of Computer and Information,Hefei University of Technology,Hefei 230009;2.School of Computer and Information,Anqing Teachers College,Anqing 246011,China);Application about Pre-warning in High Education Degree Based on Association Rules[J];Journal of Anqing Teachers College(Natural Science Edition);2009-01
2 KONG Huijun(South China Teacher's University, Education and Science College Psychologist Department, Guangzhou 510631);Two Traditions in Memory Study[J];Journal of Anyang Teachers College;2003-03
3 CHENG Yong-xin,XU Jia-yi,CHEN Ke (School of Applied Mathematics, UEST of China Chengdu 610054);A Novel IDS Model and the Arithmetic to Get the Detection[J];Journal of University of Electronic Science and Technology of China;2006-02
4 HE Fen, WU Ye-fu(Wuhan University of Technology, Wuhan 430063, China);Application Research of an Improvement on Apriori Algorithm in Evaluating Teaching Quality[J];Computer Knowledge and Technology;2010-01
5 YANG Wang-li, WU Ya-juan, WANG Li-xia ( Computer Science and Engineering College, Daqing Petroleum Institute, Anda, Heilongjiang 151400, China );Design of grade analyzing and test paper quality evaluating system and its realization[J];Journal of Daqing Petroleum Institute;2002-02
6 XIAO Yanling 1,2 , WANG Jiashan 1, XU Fuyuan 2 ( 1. Economy and Management College, Daqing Petroleum Institute, Daqing Helongjiang 163318, China; 2. Management College, Shanghai University of Science and Technology, Shanghai 200093, China );Fuzzy synthetic evaluation of teaching quality of graduation thesis and project in higher institutions[J];Journal of Daqing Petroleum Institute;2003-01
7 LI Jun( Management School, Wuyi University, Jiangmen, Guangdong 529020 ,China );A generalization model of implementing:a data mining system[J];Journal of Daqing Petroleum Institute;2003-03
8 FENG Ya-li~1, YI San-quan~2, WU kai~1, DAI Qing~1, Wang Shen-yu~3( 1. Computer Science and Information Technology College, Daqing Petroleum Institute, Daqing Heilongjiang 163318, China; 2. Education Administration, Daqing Petroleum Institute, Daqing Heilongjiang 163318, China; 3. Committee of Economic Development of Datong District, Daqing, Heilongjiang 163515, China );WEB-based security tactics of the school record management system[J];Journal of Daqing Petroleum Institute;2004-06
9 HE Qian hua,LU Yi qing,WEI Gang (Dept.of Electronics Engineering,South China Univ.of Technology, Guangzhou 510641,China);A New Approach for HMM Training[J];ACTA ELECTRONICA SINICA;2000-09
10 LIN Ya ping,LIU Yun zhong,ZHOU Shun xian,CHEN Zhi ping,CAI Li jun (College of Computer and Communication,Hunan University,Changsha,Hunan 410082,China);Using Hidden Markov Model for Text Information Extraction Based on Maximum Entropy[J];Acta Electronica Sinica;2005-02
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 YE Fu-lan;Fuzhou College of Foreign Studies and Trade;;The Analysis and Application of College Students Per-warning Status Based on Data Mining[J];Journal of Changchun Normal University;2013-10
2 LI Chun-qiu,HE Jun Department of Electric Information Engineering,Anhui Business Vocational and Technical College,Wuhu Anhui,241002,China;College Students'Performance Management Based on Data Mining Technology[J];Journal of Suzhou University;2013-02
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 HU Hua ping,CHEN Hai tao,HUANG Chen lin,TANG Yong(School of Computer Science, National University of Defense Technology, Changsha 410073, China);The Status Quo and Trend of Intrusion Detection System Research[J];Computer Engineering & Science;2001-02
2 LIAN Yi Feng DAI Ying Xia WANG Hang (State Key Laboratory of Information Security, The Graduate School of Chinese Academy of Sciences, Beijing 100039);Anomaly Detection of User Behaviors Based on Profile Mining[J];Chinese Journal of Computers;2002-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved