下载此文档

未知网络攻击识别关键技术研究 曹扬晨.pdf


文档分类:IT计算机 | 页数:约7页 举报非法文档有奖
1/7
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/7 下载此文档
文档列表 文档介绍
http://www.jsjkx.com
DOI:10.1189cks,which is also a problem that has
plagued this field for a long time.Aiming at unknown types of intrusion attacks,an unknown attack recognition model combining
K-Means and FP-Growth algorithms is proposed to extract the rules of unknown attacks.First,for the data of a mixture of multi-
ple unknown attacks,cluster analysis is performed with K-Means based on the similarity between samples,and the silhouette co-
efficient is introduced to evaluate the effect of clustering.After the clustering is completed,the same unknown attacks are classi-
fied into the same cluster,the feature of unknown attack is manually extracted,the feature data is preprocessed,the continuous
feature is discretized,and then the frequent item sets and association rules of the unknown attack data are mined by the FP-
Growth algorithm,and finally the rule unknown attack is obtained by analyzing it.The rules of attack are used to detect this type
of unknown attack.The results show that the accuracy rate can reach 98.74%,which is higher than that of the related algo-
rithms.
Keywords Intrusion detection,Unknown attack,K-Means,FP-Growth,Association rules
 
的 个 根据台收集整理的数据显
引言

未知网络攻击识别关键技术研究 曹扬晨 来自淘豆网m.daumloan.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数7
  • 收藏数0 收藏
  • 顶次数0
  • 上传人小舍儿
  • 文件大小628 KB
  • 时间2022-07-26