[1]曾庆花 王文国.一种改进的模糊关联算法及其在IDS中的应用[J].计算机技术与发展,2007,(07):236-239.
 ZENG Qing-hua,WANG Wen-guo.An Improved Algorithm of Fuzzy Association Rules and Its Application in IDS[J].,2007,(07):236-239.
点击复制

一种改进的模糊关联算法及其在IDS中的应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2007年07期
页码:
236-239
栏目:
应用开发研究
出版日期:
1900-01-01

文章信息/Info

Title:
An Improved Algorithm of Fuzzy Association Rules and Its Application in IDS
文章编号:
1673-629X(2007)07-0236-04
作者:
曾庆花 王文国
曲阜师范大学计算机科学学院
Author(s):
ZENG Qing-huaWANG Wen-guo
Dept. of Computer ,Science, Qufu Normal University
关键词:
模糊关联入侵检测系统哈希链表等价类
Keywords:
fuzzy association rules IDS Hash chain table equivalence class
分类号:
TP301.6
文献标志码:
A
摘要:
关联规则的发现是数据挖掘中的一个重要问题.但只是对离散型数据进行处理。为解决连续数量值属性的划分出现的“尖锐边界”问题,采用模糊划分,实现数据平滑过渡。由于入侵检测系统(IDS)对训练数据要求不高,文中提出了一种使用哈希链表改进模糊关联规则挖掘的新算法,且在挖掘过程中使用了等价类快速查找频繁项集,避免了反复扫描数据库及大量重复计算检验步骤。通过一个入侵检测系统的算例显示了其优越性,来提高对入侵数据的识别能力
Abstract:
Disoovery of association rule is an important problem in database mining, but it is merely used to handle the discrete data. To partition continuous quantitative attribute is handled by using fuzzy partition in order to solve the problem of sharpening boundary, which provides a smooth transition of data partition. On IDS the requirements of training data are very low. In the paper,an improved algorithm using Hashing tables on mining fuzzy association rules is proposed, and equivalence classes are introduced to search frequent itemsets quickly. With this algorithm the usual practice of repeatedly database scanning can be avoided. Its efficiency is showed with a typical use on intrusion detection system (IDS)from network datasets

相似文献/References:

[1]陶善旗 李俊 郭伟群 李海龙.入侵检测系统中模式匹配算法的研究与改进[J].计算机技术与发展,2010,(02):167.
 TAO Shan-qi,LI Jun,GUO Wei-qun,et al.Research and Improvement of Pattern Matching Algorithm for Intrusion Detection System[J].,2010,(07):167.
[2]高永梅 吴吉义[] 平玲娣.一种改进的移动自组网络入侵检测系统研究[J].计算机技术与发展,2009,(08):140.
 GAO Yong-mei,WU Ji-yi,PING Ling-di.Research on Improved Intrusion Detection System in Mobile Ad hoc Network[J].,2009,(07):140.
[3]孟宪苹 宋菲 李俊.基于序列模式挖掘的入侵检测系统的研究[J].计算机技术与发展,2008,(03):154.
 MENG Xian-ping,SONG Fei,LI Jun.Research of Intrusion Detection System Based on Sequential Pattern Mining[J].,2008,(07):154.
[4]李玲娟 李冰 薛明.K-MEANS算法在IDS中的应用研究[J].计算机技术与发展,2010,(07):129.
 LI Ling-juan,LI Bing,XUE Ming.Research on Application of K-MEANS Algorithm in IDS[J].,2010,(07):129.
[5]玄加林 才书训.分布式入侵检测中负载平衡的应用分析与设计[J].计算机技术与发展,2006,(01):213.
 XUAN Jia-lin,CAI Shu-xun.Application Analysis and Design of Loading Balance in Distributed Intrusion Detection System[J].,2006,(07):213.
[6]蔡敏 叶震 徐吉斌.协议分析技术在入侵检测中的应用[J].计算机技术与发展,2007,(02):239.
 CAI Min,YE Zhen,XU Ji-bin.Application of Protocol Analysis Technology in IDS[J].,2007,(07):239.
[7]肖竟华 卢娜.基于网络的入侵检测系统的研究及实现[J].计算机技术与发展,2007,(02):242.
 XIAO Jing-hua,LU Na.The Study and Implementation of NIDS[J].,2007,(07):242.
[8]方贤进 李敬兆 姚亚锋 陈代梅.一种校园网的网络安全策略[J].计算机技术与发展,2006,(05):121.
 FANG Xian-jin,LI Jing-zhao,YAO Ya-feng,et al.A Network Security Strategy for Campus Network[J].,2006,(07):121.
[9]刘毅 刘益和.基于jQuery的SQL注入攻击防范实现[J].计算机技术与发展,2011,(02):177.
 LIU Yi,LIU Yi-he.JQuery-Based Implementation of SQL Injection Attacks Prevention[J].,2011,(07):177.
[10]马占飞,尹传卓.Windows 平台下 Snort 系统的架构与实现[J].计算机技术与发展,2013,(01):154.
 MA Zhan-fei,YIN Chuan-zhuo.Architecture and Implementation of Snort System under Windows Platform[J].,2013,(07):154.

备注/Memo

备注/Memo:
国家人事部高层次留学人员回国工作资助项目(国人部发[2004]61号)曾庆花(1981-),女,山东曲阜人,硕士研究生,研究方向为网络信息安全;王文国,博士,教授,研究方向为网络通信与信息安全
更新日期/Last Update: 1900-01-01