一种基于数据挖掘的告警相关方法的研究与实现

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

一种基于数据挖掘的告警相关方法的研究与实现作者:陶建明学位授予单位:湖南大学参考文献(49条)1.DainOM.CunninghamRKBuildingScenariosfromaHeterogeneousAlertStream20012.HalmeLR.BauerKRAINTmisbehaving-ataxonomyofanti-intrusiontechniques19953.KarlLevittIntrusionDetection:CurrentCapabilitiesandFutureDirections20024.MartinRoeschSnort:LightweightIntrusionDetectionforNetworks19995.PaxsonVBro:asystemfordetectionnetworkintrusioninreal-time1999(23-24)6.HoaglandJSPADE20007.JavitsHS.ValdesATheNIDESstatisticalcomponent:DescriptionandjustificationSRIInternational,[ComputerScienceLaboratory,TeehRep:SRl293201]19938.MahoneyM.ChanPKLearningNonstationaryModelsofNormalNetworkTrafficforDetectingNovelAttacks20029.MahoneyMNetworkTrafficAnomalyDetectionBasedonPacketBytes200310.KoC.FinkG.LevittKAutomateddetectionofvulnerabilitiesinprivilegedprogramsbyexecutionmonitoring199411.KoCExecutionMonitoringofSecurity-CriticalProgramsinaDistributedSystem:ASpecification-BasedApproach199712.SekarR.YongCai.MarkSegalASpecification-BasedApproachforBuildingSurvivableSystems199813.SekarR.UppuluriPSynthesizingFastIntrusionPrevention/DetecionSystemsforHigh-levelSpecifications199914.PremUppuluri.SekarRExperienceswithSpecification-BasedIntrusionDetection200115.sekarR.GuptaA.FrulloJSpecification-basedAnomalyDetection:AnewapproachforDetectionNetworkIntrusions200216.InternetSecuritySystemsInc(ISS)RealSecure200417.DanielJBurroughs.LindaFWilson.GeorgeVCybenkoAnalysisofDistributedIntrusionDetectionSystemsUsingBayesianMethods200218.DenningDEAnintrusion-detectionmode1987(02)19.李娜.秦拯.张大方.陈蜀宇基于MarkovChain的协议异常检测模型[期刊论文]-计算机科学2004(10)20.ManganarisAdatamininganalysisofRTIDalarms[外文期刊]2000(04)21.JeaweiHan.MichelineKamber.范明.孟小峰DataMiningConceptsandTechniques200222.AgrawalR.SrikantRFastalgorithmsforminingassociationrules199423.SrikantR.VuQ.AgrawalRMiningassociationruleswithitemconstraints199724.HuangZClusteringLargedatasetswithmixednumericandcategoricalvalues199725.徐丽娜神经网络控制199926.AnupKGhosh.AaronSchwartzbardAStudyinUsingNeuralNetworksforAnomalyandMisuseDetection199927.ChristinaWarrender.StephanieForrestDetectionIntrusionsUsingSystemCalls:AlternativeDataModels199928.HofmeyrSA.SomayajiA.ForrestSIntrusionDetectionusingSequencesofSystemCalls199829.ValdesA.SkinnerKProbabilisticAlertCorrelation200130.DebarH.WespiAAggregationandcorrelationofIntrusionDetection200131.何明耘.戴冠中分布式入侵检测体系结构研究[期刊论文]-计算机工程与应用2001(15)32.何友多传感器数据融合模型综述[期刊论文]-清华大学学报(自然科学版)1996(9)33.DainO.CunninghamRKFusingaheterogeneousalertstreamintoscenarios200134.ValdesA.SkinnerSBlueSensors,SensorCorrelation,andAlertFusion200035.IETPstandard199936.CurryD.DebarHIntrusionDetectionMessageExchangeFormatDataModelandExtensibleMarkupLanguage(XML)DocumentTypeDefinition200037.ValdesA.SkinnerKProbabilisticAlertCorrelation38.DebarH.WespiAAggregationandcorrelationofintrusion-detectionalerts39.NingP.ReevesD.YunCuiCorrelatingalertsusingprerequisitesofintrusions.[TechnicalReportTR-2001-13,NorthCarolinaStateUniversity,DepartmentofComputerScience]200140.CuppensF.MiègeAAlertCorrelationinaCooperativeIntrusionDetectionFramework200241.NingP.CuiYAnIntrusionAlertCorrelatorBasedonPrerequisitesofIntrusions.[TechnicalReportTR-2002-1,NorthCarolinaStateUniversity,DepartmentofComputerScience]200242.ManganarisS.ChristensenM.ZerkleDAdatamininganalysisofRTIDalarms[外文期刊]2000(04)43.MargaretHDunham.郭崇慧.田凤占数据挖掘教程200544.戴英侠.连一峰.王航系统安全与入侵检测200245.毛国君.段立娟.王实.石云数据挖掘原理与算法200546.张耀疆聚焦黑客200247.SmythP.GoodmanRMAnInformationTheoreticApproachtoRuleInductionFromDatabases199?(04)48.徐勇.周森鑫一种改进的关联规则挖掘方法研究[期刊论文]-计算机技术与发展2006(3)49.UndyMtcpreplay.SoftwarePackage1999本文链接:

1 / 66
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功