the whole process of network data collection, data pretreatment, conformation of training data volume, data filtration and creating intrusion detection rules by using data mining are designed.

  • 探讨了从网络数据采集、数据预处理、构造训练数据集、数据过滤,到利用数据挖掘技术生成入侵检测规则的整个过程的机理和实现方法。
目录 查词历史