期刊文献+

基于智能模型的入侵检测技术与方法研究 被引量:2

Research on Intrusion Detection Technology and Method Based on Intelligent Model
下载PDF
导出
摘要 入侵检测技术是计算机安全领域的一项重要技术,是计算机信息系统的安全保障。以神经网络的入侵检测方法和数据挖掘的入侵检测方法为例,对基于智能模型的入侵检测技术与方法进行了探讨和研究,阐述了两种方法的实现原理,并对其技术与方法特点进行了详细的分析。 The intrusion detection technology is a computer security domain important technology,is the computer information system safety control.This article take the neural network intrusion detection method and the data mining intrusion detection method as an example,to has carried on the discussion and the research based on the intelligent model intrusion detection technology and the method,elaborated two methods realization principles,and have carried on the detailed analysis to its technology and the method cha...
作者 刘渊 熊育
出处 《舰船电子工程》 2008年第7期139-142,共4页 Ship Electronic Engineering
关键词 入侵检测 神经网络 数据挖掘 intrusion detection neural network data mining
  • 相关文献

参考文献7

二级参考文献13

  • 1王柏.分布式计算环境[M].北京邮电大学出版社,..
  • 2[1]Lee W, Stolfo S J, Mok K. Data mining in work flow environments: experiences in intrusion detection. In: Proceedings of 1999 Conference on Knowledge Discovery and Data Mining(KDD-99), 1999
  • 3[2]Warrender C, Forrest S, Pearlmutter B. Detecting intrsions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1999. 135
  • 4[3]Li T. An intelligent neural network programming system(NNPS). ACM SIGPLAN Notices, 2000, 35(3)
  • 5Tan K,Intrusion Detection Systems and a View to Its Forensic Application
  • 6王柏,分布式计算环境
  • 7Agrawal R, Strikard R. Fast Algorithms for Mining Association Rules.In Proceedings of the 20th ULDB Conferance,Santiago, Chile, 1994
  • 8Klemettinen M,Mannila H,Ronkainen P, et al.Finding Interesting Rules from Large Sets of Discovered Association Rules. In Proceedings of the 3rd Intemational Conference on Information and Knowledge Management(CIKM'94),Gainthersburg, MD, 1994:401-407
  • 9Stolfo S L, Promidis A L.Tselepis S,et al. JAM:Java Agents for Metalearning Overdistributed Databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining,Newport Beach,CA,AAAI Press, 1997-08:74-81
  • 10朱大铭,马绍汉.二进制神经网络分类问题的几何学习算法[J].软件学报,1997,8(8):622-629. 被引量:9

共引文献97

同被引文献22

  • 1赵守伟.数据挖掘在网络异常检测中的应用[J].河北大学学报(自然科学版),2004,24(4):444-447. 被引量:2
  • 2于枫,马晓春,高翔.频繁情节挖掘方法在入侵检测中的应用[J].计算机应用研究,2005,22(7):153-155. 被引量:2
  • 3朱建冲,杨美玲,屠永宁.从网络中心战构想思考我海军信息化建设[J].海军工程大学学报(综合版),2005,2(3):43-46. 被引量:2
  • 4何波,程勇军,涂飞,杨武.自适应入侵检测专家系统模型[J].计算机工程,2007,33(10):158-160. 被引量:6
  • 5DoD. Report to Congress: Network Centric Warfare [R]. Washington D. C. : Department of Defense United States of America, 2001.
  • 6ZHU X J. Anomaly detection through statistics based machine learning for computer networks[D]. Tucson: The University of Arizona, 2006.
  • 7JING X P, WANG H X, HAN R F. Improved Genetic Algo- rithm in Intrusion Detection Model Based on Artificial Immune Theory[C]//The 1st IEEE International Symposium on Com- puter Network and Multimedia Technology, Wu Han, China: IEEE Press, 2009 : 659-962.
  • 8HAN R F, WANG H X, Xiao Q. Service oriented decentral- ized access control for military systems in Net-Centric Environ- ment[C]//The 2nd International Symposium on Electronic Commerce and Security, 2009,5 : 209-214.
  • 9HAN R F, WANG H X, XIAO Q. A united access control model for systems in collaborative commerce[J]. Journal of Networks, 2009 (6): 279-289.
  • 10Denning D E. An Intrusion Detection Model [J]. IEEE Trans- action on Software Engineering, 1987, SE-13 : 222-232.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部