期刊文献+

非均匀分布入侵检测模型的研究与仿真 被引量:8

Non-uniform Distribution Intrusion Detection Research and Simulation of the Model
下载PDF
导出
摘要 网路入侵过程中入侵特征种类繁多,形成耦合性,很难形成较为规则的分布,传统的入侵检测方法都是假设网络入侵特征呈现独立高斯分布的,但是,一旦入侵特征耦合性较差,造成非高斯入侵数据拟合能力差,导致检测精度不理想。为了避免上述缺陷,提出了一种基于变异特征估计算法的非均匀分布入侵检测模型。在海量的网络操作数据中,提取出变异特征,根据提取的特征能够进行网络入侵检测。利用变异特征估计算法,能够建立合理的非均匀分布入侵检测模型,从而检测出网络入侵行为。实验结果表明,在非均匀分布的环境下,利用该算法对网络攻击行为进行检测,使非高斯数据具有更强的拟合能力,极大地降低了网络入侵检测的误报率和漏报率,提高了入侵检测的检测率。 Put forward a kind of of variation feature estimation algorithm based on non-uniform distributed intrusion de- tection model. In vast amounts of network operation data, to extract the variation characteristic, according to the features of extraction ability of network intrusion detection. Algorithm is estimated based on the variation characteristics, to estab- lish reasonable non-uniform distributed intrusion detection model, so as to detect the network intrusion behavior. Experi- mental results show that the nonuniform distribution of the environment, the algorithm presented in this paper to test the network attack behavior, make the non-gaussian data has better fitting ability, greatly reduces the network intrusion de- tection rate of false positives and non-response rates, increased rates of detection of intrusion detection.
作者 叶青 黄炎磊
出处 《科技通报》 北大核心 2013年第8期169-171,共3页 Bulletin of Science and Technology
基金 广东省教育厅 佛山市 中央电大 省电大科研项目立项 广东省电大远程教育开放基金项目(YJ1110)
关键词 入侵检测 非均匀分布 变异特征 高斯分布 intrusion detection non-uniform distribution variation characteristics gaussian distribution
  • 相关文献

参考文献4

二级参考文献67

  • 1史美林,钱俊,许超.入侵检测系统数据集评测研究[J].计算机科学,2006,33(8):1-8. 被引量:24
  • 2祖宝明,詹永照,卿林.一种针对MANET入侵检测Agent分布的分簇方法[J].微计算机信息,2007,23(05X):41-43. 被引量:1
  • 3Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4. 被引量:1
  • 4Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232. 被引量:1
  • 5Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990. 被引量:1
  • 6Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997. 被引量:1
  • 7Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456. 被引量:1
  • 8Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996. 被引量:1
  • 9Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997. 被引量:1
  • 10Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999. 被引量:1

共引文献396

同被引文献44

引证文献8

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部