메뉴 건너뛰기




Volumn 5, Issue 14, 2013, Pages 3824-3829

The design and implementation of intrusion detection system based on data mining technology

Author keywords

Data mining technology; Information security; Intrusion detection

Indexed keywords


EID: 84876307056     PISSN: 20407459     EISSN: 20407467     Source Type: Journal    
DOI: 10.19026/rjaset.5.4531     Document Type: Article
Times cited : (8)

References (8)
  • 1
    • 84876313026 scopus 로고    scopus 로고
    • The approach of instruction detection based on data mining
    • Chen, X., 2010. The approach of instruction detection based on data mining. J. Comput. Eng., 3(5): 156-161.
    • (2010) J. Comput. Eng. , vol.3 , Issue.5 , pp. 156-161
    • Chen, X.1
  • 2
    • 84876304478 scopus 로고    scopus 로고
    • Research intrusion detection system based on data mining technology
    • Gao, X. and M. Wang, 2003. Research intrusion detection system based on data mining technology. J. Northwestern Polytech. Univ., 21(4): 189-192.
    • (2003) J. Northwestern Polytech. Univ. , vol.21 , Issue.4 , pp. 189-192
    • Gao, X.1    Wang, M.2
  • 3
    • 84876306186 scopus 로고    scopus 로고
    • Application research of data mining technology for intrusion detection
    • Gu, J. and L. Sun, 2006. Application research of data mining technology for intrusion detection. J. Comput. Technol. Develop., 16(9): 243-246.
    • (2006) J. Comput. Technol. Develop. , vol.16 , Issue.9 , pp. 243-246
    • Gu, J.1    Sun, L.2
  • 4
    • 0034335199 scopus 로고    scopus 로고
    • A survey of intrusion detection research on network security
    • Jiang, J., H. Ma and D. Ren, 2000. A survey of intrusion detection research on network security. J. Softw., 11(11): 1460-1466.
    • (2000) J. Softw. , vol.11 , Issue.11 , pp. 1460-1466
    • Jiang, J.1    Ma, H.2    Ren, D.3
  • 5
    • 0036488412 scopus 로고    scopus 로고
    • The structure of intrusion detection system based on data mining approach
    • Lu, Y., Y. Cao and J. Ling, 2003. The structure of intrusion detection system based on data mining approach. J. Wuhan Univ., 48(1): 63-66.
    • (2003) J. Wuhan Univ. , vol.48 , Issue.1 , pp. 63-66
    • Lu, Y.1    Cao, Y.2    Ling, J.3
  • 6
    • 84876322363 scopus 로고    scopus 로고
    • Data mining approaches for network intrusion detection
    • Ning, Y. and X. Guo, 2006. Data mining approaches for network intrusion detection. J. Comput. Measur. Control, 10(3): 189-192.
    • (2006) J. Comput. Measur. Control , vol.10 , Issue.3 , pp. 189-192
    • Ning, Y.1    Guo, X.2
  • 7
    • 84876306451 scopus 로고    scopus 로고
    • An intelligent model of instrusion detection based on data mining approach
    • Su, H. and L. Fu, 2007. An intelligent model of instrusion detection based on data mining approach. J. Micro Comput. Inform., 23(3): 74-77.
    • (2007) J. Micro Comput. Inform. , vol.23 , Issue.3 , pp. 74-77
    • Su, H.1    Fu, L.2
  • 8
    • 84876319778 scopus 로고    scopus 로고
    • Intrusion detection system based on data mining technology
    • Xu, S. and L. Cai, 2008. Intrusion detection system based on data mining technology. J. Elect. Des. Eng., 17(8): 3-5.
    • (2008) J. Elect. Des. Eng. , vol.17 , Issue.8 , pp. 3-5
    • Xu, S.1    Cai, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.