2

所属分类:数值算法/人工智能
开发工具:Others
文件大小:931KB
下载次数:1
上传日期:2015-04-25 20:13:41
上 传 者虎虎虎虎
说明:  本文前三章分别简要介绍信息安全,入侵检测和安全日志的相关 概念和基本原理;第四章重点介绍数据挖掘技术,包括了关联规则分 析,序列分析,分类分析和聚类分析;第五章论证数据挖掘技术应用 于入侵检测系统的必要性和实施的系统架构;第六章详细说明实验流 程和实验过程中对关联规则算法的改进,其中重点研究了运用 K-均 值算法对审计日志做预处理和在实现关联规则挖掘时,如何改进 Apriori 算法,使之能在面对安全日志这种高维度数据时比原有算法 效率获得大幅度提高;
(This article briefly describes the first three chapters were related to information security, intrusion detection, and security logs The basic concepts and principles chapter focuses on data mining technology, including a sub-association rules Analysis, sequence analysis, classification and clustering analysis Chapter demonstrate the application of data mining techniques On the necessity of the intrusion detection system and system architecture implementation flow experiments described in detail in Chapter VI Cheng and experiment to improve the algorithm of association rules, which are focused on the use of K- Value preprocessing algorithm for audit logs and in the realization of association rule mining, the ways to improve Apriori algorithm, so that it can log in the face of such high-dimensional data security than the original algorithm Obtain greatly improved efficiency )

文件列表:
基于数据挖掘的入侵检测系统的设计与实现.caj (261165, 2012-05-11)
基于数据挖掘的入侵检测技术研究.kdh (754827, 2012-05-11)

近期下载者

相关文件


收藏者