期刊文献+

混合免疫异常检测

下载PDF
导出
摘要 传统的基于免疫的入侵检测系统采用低级别的二进制检测器,妨碍了有意义的知识提取,对Nonself空间的覆盖也不完备。研究了实值否定选择算法,使用实值否定选择算法来产生非自体样本。应用分类算法来寻找自体的特征功能。
作者 王大伟
出处 《黑龙江科技信息》 2008年第3期55-55,151,共2页 Heilongjiang Science and Technology Information
  • 引文网络
  • 相关文献

参考文献2

  • 1董晓梅,于戈,肖珂,向光.基于免疫的入侵检测方法研究[J].小型微型计算机系统,2005,26(10):1736-1741. 被引量:13
  • 2Wenke Lee,Salvatore J. Stolfo,Kui W. Mok. Adaptive Intrusion Detection: A Data Mining Approach[J] 2000,Artificial Intelligence Review(6):533~567

二级参考文献20

  • 1Cabrera J, Ravichandran B, Mehra R K. Statistical traffic modeling for network intrusion detection[A]. Proc IEEE Int Workshop Model Anal Simul Comput Telecommun Syst[C]. Washington. D. C.: IEEE Computer Society Press, 2000, 466-473.
  • 2Lindqvist U, Porras P A. Detecting computer and network misuse through the production-based expert system toolset (PBEST) [A]. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy[C]. Washington D. C.: IEEE Computer Society Press, 1999, 146-161.
  • 3Lee S C, Heinbuch D V. Training a neural-network based intrusion detector to recognize novel attacks[J]. IEEE Trans Syst Man Cybern PT a Syst Humans, 2001,31(4): 294-299.
  • 4Lee W, Stolfo S J, Mok K W. Adaptive intrusion detection&colon: a data mining approach[J]. Artificial Intelligence Review, 2000,14(6) :533-567.
  • 5Hofmeyr S A, Forrest S. Architecture for an artificial immune system[J]. Evolutionary Computation, 2000,8 (4): 443-473.
  • 6Hofmeyr S A, Forrest S. Immunity by design: an artificial immune system[A]. Proceedings of the Genetic and Evolu-tionary Computation Conference (GECCO)[C]. San Francisco: Morgan-Kaufmann, 1999, 1289-1296.
  • 7Balthrop J, Esponda F, Forrest S et al. Coverage and generalization in an artificial immune system[A]. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002)[C]. New York: Morgan Kaufmann, 2002,3-10.
  • 8Chao D L, Forrest S. Information immune systems[A]. Proceedings of the First International Conference on Artificial Immune Systems (ICARIS) [C]. 2002, 132-140.
  • 9Hofmeyr S A. An immunological model of distributed detection and its application to computer security[D]. Albuquenque: University of New Mexico, 1999.
  • 10Dasgupta D. Immunity-based intrusion detection system: a general framework. In: Proceedings of the 22nd National Information Systems Security Conference (NISSC), 1999[EB/OL].http:∥csrc. nist. gov/nissc/1999/proceeding/papers/p11. pdf.

共引文献12

;
使用帮助 返回顶部