期刊文献+

基于神经网络的程序异常监测

Program behavior anomaly detection based on neural network
下载PDF
导出
摘要 针对传统入侵检测系统的不足,研究了基于反向传播神经网络的程序异常检测方法,提出了一个改进的利用多层前馈网络的预测功能和异常区域判定方法检测系统异常的算法.详细讨论了算法的基本原理、数学基础、设计和实现方法.通过实验,分析算法的优缺点,验证了算法的可行性和有效性. Neural network can be used in anomaly detection.To improve the traditional intrusion detection system performance,we often have to change the neural network structure and detection algorism.And because intrusion techniques are most changeable and unpredictable,it is therefore impossible to always use the fixed detection techniques to catch exactly all possible intrusions.In this paper,an improved algorithm of process anomaly detection based on back propagation(BP) neural network is proposed,which uses the forecast function of multi-level perception and anomaly area estimating method to detect system anomaly.Some details and issues on the design and implementation of the algorithm are discussed.The experimental results are also illustrated and analyzed.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2005年第z1期136-141,共6页 Journal of Dalian University of Technology
基金 陕西省自然科学基金资助项目(2003F20) 航空科学基金资助项目(03F31007)
关键词 网络安全 程序异常检测 反向传播神经网络 network security program anomaly detection BP neural network
  • 相关文献

参考文献9

  • 1[1]CANNADY J, MAHAFFEY J. The application of artificial neural networks to misuse detection : Initial results, [EB/OL]. Atlanta: Georgia Tech Research Institute, 2002-08-05[2005-07-09]. http://www.raid-symposium.org/raid98/Prog_RAID98.
  • 2[2]LIPPMANN R, CUNNINGHAM R. Improving intrusion detection performance using keyword selection and neural networks[J]. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2000, 34(4):597-603.
  • 3[3]CUNNINGHAM R, LIPPMANN R. Detecting computer attackers : Recognizing patterns of malicious, stealthy behavior.[EB/OL]. West Lafayette IN: CERIAS, Purdue University,2000-11-19[2005-07-13]. http://www. cerias. purdue. edu /secsem/abstracts0001. php.
  • 4[4]GIRARDIN L, BRODBECK D. A visual approach for monitoring logs[A]. Proceedings of the 12th System Administration Conference (LISA '98)[C]. Berkeley: USENIX Association, 1998: 299-308.
  • 5[5]GIRARDIN L. An eye on network intruder-administrator shootouts[A]. Proceedings of the 1st Workshop on Intrusion Detection and Network Monitoring (ID '99)[C]. Berkeley: USENIX Association, 1999:19-28.
  • 6[6]GHOSH A, SCHWARTZBARD A. A study using neural networks for anomaly detection and misuse detection [EB/OL]. Berkeley: USENIX Association,2001-08[2005-07-04]. http://www. usenix. org/publications/library/ proceedings/sec99/ghosh. html.
  • 7[7]FORREST S, HOFMEYR S, SOMAYAJI A. Computer immunology[J]. Communication of ACM, 1997, 40(10):88-96.
  • 8吴晓南,房鼎益.一个分布式拒绝服务攻击检测系统的设计[J].计算机工程,2004,30(5):139-141. 被引量:4
  • 9安娜,张凡,吴晓南,张建中,房鼎益.一个基于移动Agent的分布式入侵检测系统[J].西北大学学报(自然科学版),2005,35(1):25-28. 被引量:7

二级参考文献9

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部