Apriori算法在入侵检测系统中的改进
Improvement of Apriori Algorithm in Intrusion Detection System
DOI: 10.12677/JSST.2016.44007, PDF, HTML, XML, 下载: 1,850  浏览: 4,614 
作者: 王 鑫*:南京邮电大学通信与信息工程学院,江苏 南京
关键词: 入侵检测数据挖掘分布式计算Apriori算法Intrusion Detection Data Mining Distributed Computing Apriori Algorithm
摘要: 随着互联网的发展,网络安全形势日趋严峻,网络安全问题频发,这些安全问题出现在各行各业,造成的危害越发严重。而对于每天面临大量数据量的公司而言,如何在众多数据中检测出入侵病毒是个很大的挑战。用于数据挖掘的关联规则在分布式计算中发挥重要的作用,它们同样也适用于对病毒的入侵检测,本文将对数据挖掘中关联规则产生的Apriori算法在入侵检测系统下进行改进,使得它适用于对病毒的入侵检测。
Abstract: With the development of the Internet, the network security situation is becoming increasingly grim. Network security problems occur frequently. These security problems appear in all walks of life. The harm caused is more serious. And for companies who face a lot of data every day, how to detect a large number of data in the virus is a big challenge. The association rules in data mining play an important role in distributed computing, which is also suitable for the invasion of virus detection. This Apriori algorithm to association rules in data mining in intrusion detection system is improved, which makes it applicable to the invasion of virus detection.
文章引用:王鑫. Apriori算法在入侵检测系统中的改进[J]. 安防技术, 2016, 4(4): 45-50. http://dx.doi.org/10.12677/JSST.2016.44007

参考文献

[1] 薛严冬, 韩秀玲, 戴尚飞, 等. 基于Snort的分布式协作入侵检测系统[J]. 计算机工程, 2010, 36(19): 165-167.
[2] 刘东鑫, 刘国荣, 王帅, 等. 面向企业网的APT攻击特征分析及防御技术探讨[J]. 电信科学, 2013, 29(12): 158- 163.
[3] Maatta, M. and Raty, T. (2012) Automatic Creation of Models for Network Intrusion Detection. 2012 Computing, Communications and Applications Conference, 11-13 January 2012, 231-237. https://doi.org/10.1109/ComComAp.2012.6154805
[4] Mitchell, R. and Chen, I.-R. (2013) Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems. IEEE Transactions on Reliability, 62, 199-210. https://doi.org/10.1109/TR.2013.2240891
[5] Lei, J.Z. and Ghorbani, A.A. (2012) Improved Competitive Learning Neural Networks for Network Intrusion and Fraud Detection. Neurocompnting, 75, 135-145. https://doi.org/10.1016/j.neucom.2011.02.021
[6] The White House (2011) International Strategy for Cyberspace. http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf