[信息与通信]A Framework for Constructing Features and Models for Intrusion Detection Systems入侵检测.pdfVIP
- 1、本文档共35页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
[信息与通信]A Framework for Constructing Features and Models for Intrusion Detection Systems入侵检测
A Framework for Constructing Features
and Models for Intrusion Detection
Systems
WENKE LEE
Georgia Institute of Technology
and
SALVATORE J. STOLFO
Columbia University
Intrusion detection (ID) is an important component of infrastructure protection mechanisms.
Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these
requirements and the complexities of today’s network environments, we need a more system-
atic and automated IDS development process rather than the pure knowledge encoding and
engineering approaches. This article describes a novel framework, MADAM ID, for Mining
Audit Data for Automated Models for Intrusion Detection. This framework uses data mining
algorithms to compute activity patterns from system audit data and extracts predictive
features from the patterns. It then applies machine learning algorithms to the audit records
that are processed according to the feature definitions to generate intrusion detection rules.
Results from the 1998 DARPA Intrusion Detection Evaluation showed that our ID model was
one of the best performing of all the participating systems. We also briefly discuss our
experience in converting the detection models produced by off-line data mining programs to
real-time modules of existing IDSs.
Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: Gener-
al—Security and protection (e.g., firewalls); C.2.3 [Computer-Communication Networks]:
Network Operations—Network monitoring ; D.4.6 [Operating Systems]: Security and Protec-
tion; H.2.8 [Database Management]: Database applications—Data mining ; I.2.6 [Artificial
Intelligence]: Learning—Concept learning
General Terms: Design, Experimentation, Security
Additional Key Words and Phrases: Data mining, feature construction, intrusion detection
This article is based on the authors’ published papers in the Proceedings of
您可能关注的文档
- [企业管理]环境职业健康管理体系文件培训.ppt
- [企业管理]时间管理技能.ppt
- [企业管理]没有规矩_不成方圆.ppt
- [企业管理]电话咨询的常规流程及5心策略--唐中怀.ppt
- [企业管理]科思瑞智新希望品牌名称与概念研究报告补充报告》43页 金牌.ppt
- [企业管理]研发项目管理培训.ppt
- [企业管理]睿思成介绍-产品及创新管理服务领域的价值创造者.ppt
- [企业管理]第6章企业技术管理.ppt
- [企业管理]第4章 动态规划法.ppt
- [企业管理]第9章 领导.ppt
- wikipedia圣诞节-扬声器cao lideng hu christmas no vedio吠陀.pdf
- 3267 fluticasone propi-氟替丙酸鼻喷雾剂.pdf
- CRRT 的原理与机制.docx
- 铅系统concordia video surveillance solution监视解决方案.pdf
- sartorius stedim数据分析练习12 cham 70.pdf
- 七大技能之行业权威.pdf
- 十套假期作业综合练习二.pdf
- 公用工程插图.pdf
- robinson neoliberalism the global elite and guatemalan trtion-critical新自由主义全球精英危地马拉.pdf
- libcdt3libcdt3名称容器数据类型概要include.pdf
最近下载
- 2024盐雾试验标准.pdf VIP
- 2015水利安全解析27 (3).doc VIP
- 钢轨探伤——任务4.2钢轨焊缝轨头探伤.pptx VIP
- 特科纳TECHNAL幕墙系统GEODE MX 52 SSG BG 设计与加工手册.pdf VIP
- 挚驱S2系列伺服说明书V220.pdf
- DBJ04_T307-2025 住宅小区配套供电工程技术规程.docx VIP
- 甘肃刘家峡水电厂#5机励磁系统模型及参数测试及PSS试验结.ppt VIP
- 初中数学课堂等待时间与学生学习心理研究论文.docx
- 特科纳TECHNAL幕墙系统SPINAL MY 62 加工手册.pdf VIP
- 10立方双层油罐图纸.pdf VIP
文档评论(0)