硕士论文关联则的挖掘及其在入侵检测中的应用精选

硕士论文关联则的挖掘及其在入侵检测中的应用精选

ID:33312878

大小:545.70 KB

页数:67页

时间:2019-02-24

硕士论文关联则的挖掘及其在入侵检测中的应用精选_第1页
硕士论文关联则的挖掘及其在入侵检测中的应用精选_第2页
硕士论文关联则的挖掘及其在入侵检测中的应用精选_第3页
硕士论文关联则的挖掘及其在入侵检测中的应用精选_第4页
硕士论文关联则的挖掘及其在入侵检测中的应用精选_第5页
资源描述:

《硕士论文关联则的挖掘及其在入侵检测中的应用精选》由会员上传分享,免费在线阅读,更多相关内容在应用文档-天天文库

1、西南交通大学硕士学位论文关联规则挖掘及其在入侵检测中的应用姓名:荣文亮申请学位级别:硕士专业:计算机应用技术指导教师:杨燕20080124西南交通大学硕士研究生学位论文第Ⅱ页Abstract.Withtherapid。developmentofinternet,theprocessingdatainmanyapplicationareasisintheformofdatastream,suchasthemonitoringinformationfromnetworkmonitoringsystemwhichisakind

2、ofdatastream.Thesedatastreamscontainagreatdealofusefulinformationandknowledge,andabnormitiesontheinternetareeffectivelydiscoveredbyminingdatastream,whichareusedforintrusiondetection.Dataminingisamethodwhichobtainsusefulknowledgeandinformationfromlargeamountsofdat

3、as.Associationrulesminingisanimportantmethodindatamining.Initially,theresearchesonassociationru.1esalgorithmmainlyfocusedonthetraditionaldatamininginthepa§tfewyears,withtheconceptofdatastreamproposed,theresearchersbeginpayingattentiontothedatastreammining.However

4、,becausethedataoverdatastreamiscontinuous,rapid,andinfinite,SOthetraditionaldataminingtechnologydon’tperformwellforthedatastream.Therefore,agrowingnumberofresearchersstartanewresearchonassociationrulesminingoverdatastream.Thispapersystematicallyintroducestraditio

5、nalassociationrulesminingalgorithmsandtheirkeytechnology,andproposesanimprovedalgorithmaccordingtotheirkeytechnology;Inaddition,thepaperalsoanalyzesthecharacteristicsofthedatastreamindetail,andmainlyintroducestWOclassicalalgorithmsonfrequentpatternminingoverdatas

6、treamatthesametime..Finally,itputsforwardafrequentclosedpatternsminingalgorithmoverdatastreamwiththeclosedpatternsminingtechnologywhichisoneofmethodsoftheassociationrulemining.・’Finally,thispaperappliesthetwoalgorithmsproposedabovetotheanomaly—basedintrusiondetec

7、tion,anddesignsanintrusjondetectionII西南交通大学硕士研究生学位论文第1II页systemmodelbasedontheassociationrulesmining.Themodelusesanomalydetectiontechnology,whichdividestheprocessesofin.trusiondetectionintotwoparts:detectionprocessandlearningprocess.Thefirstprocessperformswiththe

8、algorithmofassociationrulesmini.ngoverdatastream,andthesecondprocessperformswithtraditionalassociationminingalgorithm.Toacertainextent,themodelcanimprovereal.t

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。