期刊文献+

基于误差反向传播的入侵检测系统的研究 被引量:1

Research of Intrusion Detection System Based on Back Propagation Neural Network
原文传递
导出
摘要 构建了一种基于误差反向传播神经网络的入侵检测系统总体架构,分析了该系统的各组成模块和功能要求。重点阐述了基于误差反向传播的入侵检测分析模块的设计方案,研究入侵分析过程中的几个关键问题并给出了解决方法。最后给出了基于误差反向传播网络的检测算法流程。 In this paper, an overall framework of intrusion detection system based on back propagation neural network is constructed, various component modules and their function requests of the system are analyzed, and the design scheme of intrusion detection and analysis module based on back propagation neural is emphatically described, several critical problems in the intrusion analysis and their the solutions are also given. Finally the detection algorithm procedure based on back propagation neural is presented.
出处 《通信技术》 2008年第5期125-127,共3页 Communications Technology
基金 四川省教育厅资助科研项目(07ZC010)。
关键词 误差反向传播 入侵检测 神经网络 滥用入侵 异常入侵 back propagation intrusion detection neural network abuse intrusion abnormal intrusion
  • 相关文献

参考文献5

二级参考文献21

  • 1Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4. 被引量:1
  • 2Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232. 被引量:1
  • 3Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990. 被引量:1
  • 4Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997. 被引量:1
  • 5Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456. 被引量:1
  • 6Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996. 被引量:1
  • 7Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997. 被引量:1
  • 8Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999. 被引量:1
  • 9Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez,David Isacoff, Eugene Spafford, Diego Zamboni. An architecture for intrusion detection using autonomous agents [R]. CERIAS Technical Report 98/05, June 11,1998. 被引量:1
  • 10Forrest S, Hofmeyr S A ,and Somayaji A. Computer immunology[J]. Communications of the ACM,1997,40(10) :88-96. 被引量:1

共引文献436

同被引文献5

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部