원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.8
2016.08
pp.263-276
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Rough Set Theory
2.1. Network Intrusion Detection Technology based on Rough Set Theory
2.2. Data Preprocessing
2.3. Knowledge Reduction Algorithm
3. Structure and Function of Anomaly Detection System based on Data Ming(ADSDM)
3.1. Data Mining-based Anomaly Detection Technology
3.2. Data Mining-based Algorithms
4. Network Security Situational Awareness System
4.1. Network Security Situation Generation
5. Experiments and Analyses
5.1. Rough Set Theory-based Experiment
5.2. ADSDM Experiment
5.3. Network Security Situation Experiment
6. Conclusion
References
Acknowledgments
1. Introduction
2. Rough Set Theory
2.1. Network Intrusion Detection Technology based on Rough Set Theory
2.2. Data Preprocessing
2.3. Knowledge Reduction Algorithm
3. Structure and Function of Anomaly Detection System based on Data Ming(ADSDM)
3.1. Data Mining-based Anomaly Detection Technology
3.2. Data Mining-based Algorithms
4. Network Security Situational Awareness System
4.1. Network Security Situation Generation
5. Experiments and Analyses
5.1. Rough Set Theory-based Experiment
5.2. ADSDM Experiment
5.3. Network Security Situation Experiment
6. Conclusion
References
Acknowledgments
저자정보
참고문헌
자료제공 : 네이버학술정보