期刊文献+

一种新的网络入侵检测模型的设计研究 被引量:1

Design and Research of A New Network Intrusion Detection Model
下载PDF
导出
摘要 入侵检测系统(IDS)成为目前动态安全工具的主要研究和开发方向.利用否定选择机制和克隆选择机制等免疫机制,提出一种新型入侵检测模型.采用遗传算法、神经网络作为对比模型,通过实验,说明了这种新型入侵检测模型的优越性. Intrusion Detection System (IDS)becomes the main research and development in the dynamic safe tool. Using the negative selection mechanism and clone selection mechanism and immune mechanism, this paper puts forward a new intrusion detection model. Using a genetic algorithm, neural network as a contrast model, the superiority of this intrusion detection model is illustrated through the experiment.
出处 《中央民族大学学报(自然科学版)》 2014年第2期39-43,共5页 Journal of Minzu University of China(Natural Sciences Edition)
基金 甘肃省教育厅硕士生导师基金项目(No.0908-04)
关键词 入侵检测 人工免疫机制 遗传算法 神经网络 intrusion detection system (IDS) artificial immune system genetic algorithm neural network
  • 相关文献

参考文献4

二级参考文献21

  • 1郭亚周,高德远,高翔.模糊聚类分析在入侵检测系统中的应用研究[J].沈阳理工大学学报,2005,24(4):26-28. 被引量:26
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 3赵俊忠,游林,徐茂智,孙善利,黄厚宽.入侵检测系统中检测技术的研究[J].计算机工程与应用,2005,41(2):11-13. 被引量:16
  • 4Yu-Sung Wu,Bingrui Foo,Yongguo Mei et al.Collaborative Intrusion Detection System(CIDS):A Framework for Accurate and Efficient IDS[C].In:Proceedings of the 19th Annual Computer Security Applications Conference(ACSAC 2003),2003. 被引量:1
  • 5Tao Zou,Hongwei Sun,Xinguang Tian et al.Modeling A Self-learing Detection Engine Automatically for IDS[C].In:Proceedings of the 2003IEEE International Conference on Robotics,Intelligent System and Signal Processing,Changsha,China,2003. 被引量:1
  • 6Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts[C].In:Proceedings of the 9th ACM Conference on Computer & Communications Security,Washington,USA:ACM Press,2002:245~254. 被引量:1
  • 7Valdes A,Sknner K.Probabilistic alert correlation[C].In:Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection,Springer-Verlag,2001:54~68. 被引量:1
  • 8Lee W,Stolfo S,Mok K.A data mining framework for adaptive intrusion detection.http://www.cs.columbia.edu/~sal/hpapers/framework.ps.gz. 被引量:1
  • 9Lee W,Stolfo S J,Mok K.Algorithms for mining system audit data.http://citeseer.ist.psu.edu/lee99algorithms.html,1999. 被引量:1
  • 10LiQun Zhang,Richard Shiavi,Member et al.Clustering Analysis and Pattern Discrimination of EMG Linear Envelopes[J].IEEE Transactions on biomedical engineering,1991;38(8). 被引量:1

共引文献37

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部