期刊文献+

遗传算法在入侵检测中的应用 被引量:9

Application of genetic algorithms to intrusion detection
下载PDF
导出
摘要 在分析以往入侵检测系统的基础上,介绍了一个误用检测与异常检测相结合的基于用户行为的多层自适应入侵检测系统模型。给出了模型的框架图以及模型主要的流程步骤,并详细分析了遗传算法在模型中的应用,给出了编码策略、适应度函数及遗传操作。 This paper proposes a multilayered adaptive intrusion detection model based on user's behavior, the model of which integrates the working of misuse with anomaly detector. The frame structure and the flow chart are also given in this paper and the genetic algorithm is applied in this model. The coding policy, fitness function and genetic operation are given and analyzed.
机构地区 重庆邮电学院
出处 《重庆邮电学院学报(自然科学版)》 2006年第2期261-263,275,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
关键词 入侵检测 误用检测器 异常检洲器 遗传算法 遗传操作 intrusion detection misuse detector anomaly detector genetic algorithms genetic operation
  • 相关文献

参考文献9

二级参考文献57

  • 1CE申南 J 麦克卡赛 陈中基译.自动机引论[M].北京:科学出版社,1963.. 被引量:1
  • 2Yun QX, Huang GQ, Wang ZQ. Genetic Algorithm and Genetic Programming. Beijing: Publishing House of Metallurgy Industry,1997 (in Chinese). 被引量:1
  • 3Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix process. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996. 被引量:1
  • 4Hofmeyr SA, Forrest S. Architecture for an artificial immune system. Evolutionary Computation Journal, 2000,8(4):443-473. 被引量:1
  • 5Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Proceedings of the1999 IEEE Symposium on Security and Privacy. 1999. 被引量:1
  • 6Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium. 1998. 被引量:1
  • 7Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA, May 1999. 被引量:1
  • 8IATF Release 3.0, Host-Based Detect & Respond Capabilities Within Computing Environments. 2000. 被引量:1
  • 9PROCTOR, Paul. The Practical Intrusion Detection Handbook [M]. Prentice Hall, 2001. 被引量:1
  • 10BACE, REBECCA. An introduction to intrusion detection and assessment: for system and network security management [D]. ICSA White Paper, 1998. 被引量:1

共引文献86

同被引文献41

引证文献9

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部