Performance of an Intrusion Detection System under Different Techniques
Performance of an Intrusion Detection System under Different Techniques
出处
《通讯和计算机(中英文版)》
2015年第3期146-154,共9页
Journal of Communication and Computer
参考文献28
-
1Dacier, M., andAlessandri, D. 1999. "VulDa: A Vulnerability Database.". 被引量:1
-
2Alessandri, D. 2004. "Attack-Class-Based Analysis of Intrusion Detection Systems." A thesis submitted to School of Computing Science, University of Newcastle upon Tyne. 被引量:1
-
3Xu, J., and Shelton, C. R. 2010. "Intrusion Detection Using Continuous Time Bayesian Networks." Journal of Artificial Intelligence Research39: 745-74. 被引量:1
-
4MAFTIA Consortium. "Towards a Taxonomy of Intrusion Detection Systems and Attacks." D. Alessandri, ed. Malicious- and Accidental-Fault Tolerance for Internet Applications. 被引量:1
-
5Dewaele, G., Fukuda, K., and Borgnat, P. 2007. "Extracting Hidden Anomalies Using Sketch and Non-Gaussian Multi-resolution Statistical Detection Procedures." In Proceedings of the 2007 Workshop on Large Scale Attack Defence, 145-52. 被引量:1
-
6Lakhina, A., Crovella, M., and Diot, C. 2005. "Mining Anomalies Using Traffic Feature Distributions." ACM SIGCOMM Computer Communication Review Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 35:217-28. 被引量:1
-
7Federal Information Processing Standards Publication 191 (FIPS PUB 191). "Guideline for the Analysis LocalArea Network Security". 被引量:1
-
8Heidari, M., 2004. Malicious Code in Depth, pp. 1-21. 被引量:1
-
9Financial Crimes Enforcement Network (FCEN), "Mortgage Loan Fraud", 2008. 被引量:1
-
10Raman, B. 2005. Cryptography and Network Security, Department of CSE, liT Kanpur. 被引量:1
-
1冯飞,韩玮,王育民.一种针对应用程序的嵌入式入侵检测系统[J].通信技术,2003,36(1):100-102.
-
2How is SaaS different from an ASP?[J].中国制造业信息化(应用版),2010,39(5):80-80. 被引量:1
-
3李大学,谢名亮,赵学斌.基于朴素贝叶斯方法的协同过滤推荐算法[J].计算机应用,2010,30(6):1523-1526. 被引量:21
-
4高峰,马辉.IDS中的数据挖掘技术和攻击的不确定性[J].安阳师范学院学报,2006(5):37-40. 被引量:1
-
5胡深.Tuning TCP under Linux[J].科技信息,2010(3).
-
6杜涛.基于入侵检测技术的计算机网络安全研究[J].网络安全技术与应用,2014(10):98-98.
-
7田捷.Geospacial information utilized under the access control strategy[J].Journal of Chongqing University,2007,6(4):256-264.
-
8Hao Bai (1) david_xiaobai@126.com Kunsheng Wang (2) Changzhen Hu (1) Gang Zhang (2) Xiaochuan Jing (2).Boosting performance in attack intention recognition by integrating multiple techniques[J].Frontiers of Computer Science,2011,5(1):109-118. 被引量:2
-
9涂保东.入侵检测系统的发展历史[J].计算机安全,2003(31):18-21. 被引量:4
-
10汤伟,程家兴,纪霞.统计学理论在邮件分类中的应用研究[J].计算机技术与发展,2008,18(12):231-234.