期刊文献+

Performance of an Intrusion Detection System under Different Techniques

Performance of an Intrusion Detection System under Different Techniques
下载PDF
导出
出处 《通讯和计算机(中英文版)》 2015年第3期146-154,共9页 Journal of Communication and Computer
关键词 入侵检测系统 技术条件 性能 朴素贝叶斯方法 网络技术 应用程序 计算机系统 保护系统 Intrusion detection system, attack trends, security, attacker, techniques, network threats, network defense.
  • 相关文献

参考文献28

  • 1Dacier, M., andAlessandri, D. 1999. "VulDa: A Vulnerability Database.". 被引量:1
  • 2Alessandri, D. 2004. "Attack-Class-Based Analysis of Intrusion Detection Systems." A thesis submitted to School of Computing Science, University of Newcastle upon Tyne. 被引量:1
  • 3Xu, J., and Shelton, C. R. 2010. "Intrusion Detection Using Continuous Time Bayesian Networks." Journal of Artificial Intelligence Research39: 745-74. 被引量:1
  • 4MAFTIA Consortium. "Towards a Taxonomy of Intrusion Detection Systems and Attacks." D. Alessandri, ed. Malicious- and Accidental-Fault Tolerance for Internet Applications. 被引量:1
  • 5Dewaele, G., Fukuda, K., and Borgnat, P. 2007. "Extracting Hidden Anomalies Using Sketch and Non-Gaussian Multi-resolution Statistical Detection Procedures." In Proceedings of the 2007 Workshop on Large Scale Attack Defence, 145-52. 被引量:1
  • 6Lakhina, A., Crovella, M., and Diot, C. 2005. "Mining Anomalies Using Traffic Feature Distributions." ACM SIGCOMM Computer Communication Review Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 35:217-28. 被引量:1
  • 7Federal Information Processing Standards Publication 191 (FIPS PUB 191). "Guideline for the Analysis LocalArea Network Security". 被引量:1
  • 8Heidari, M., 2004. Malicious Code in Depth, pp. 1-21. 被引量:1
  • 9Financial Crimes Enforcement Network (FCEN), "Mortgage Loan Fraud", 2008. 被引量:1
  • 10Raman, B. 2005. Cryptography and Network Security, Department of CSE, liT Kanpur. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部