%0 Journal Article
%T Analysis of Network User Behaviors Based on Data Mining Theory
基于数据挖掘的用户安全行为分析*
%A MIAO Hong-bao
%A LI Wei
%A
缪红保
%A 李卫
%J 计算机应用研究
%D 2005
%I
%X By using protocol decoding technology, the system can get detailed information about monitored user. Then, the method based on data-mining theory is taken to extract association rules from the information. These rules combined with other statistical data will form the pattern of the monitored user. Empirical results show that we can provided with the capability of extracting user patterns and identifying them in the network. On the other hand, this method also can detect large scale intrusion such as worms.
%K Behavior Analysis
%K User Identification
%K Data Mining
%K Association Rules
%K Network Security
行为分析
%K 身份识别
%K 数据挖掘
%K 关联规则
%K 网络安全
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=67D2D280C46F47B1&yid=2DD7160C83D0ACED&vid=BC12EA701C895178&iid=0B39A22176CE99FB&sid=03F1579EF92A5A32&eid=D767283A3B658885&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=2&reference_num=6