期刊文献+

基于Rete模式匹配算法的入侵检测系统

Intrusion Detection System Based on Expert System
下载PDF
导出
摘要 设计并实现了一个基于专家系统的网络入侵特征检测系统.针对当前入侵检测推理机制中存在的时间冗余性问题,在入侵检测推理过程中采用了Rete模式匹配算法,对推理机制进行了优化.实验结果表明,该系统在检出率和检测效率上要明显高于未采用Rete模式匹配算法的系统,采用Rete模式匹配算法能有效地克服时间冗余性问题,并改善了系统的性能. We design and realize a signature intrusion detection system based on Expert System. Faceing the redundancy of time in the reasoning of intrusion detection,we apply a new algorithm called Rete pattern matching algorithm, which optimizes the reasoning principle of the system. From the data in the experiment, we can see the rate of detection and detection efficiency of this intrusion detection system are obviously higher than the system which don't apply the Rete algorithm,which shows that using Rete pattern matching algorithm can overcome the redundancy of time effectively and improve the system performance.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2004年第3期355-359,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家863计划资助项目(863- 306- ZT05- 02)
关键词 入侵检测 专家系统 时间冗余性 Rete模式匹配算法 intrusion detection expert system redundancy of time Rete pattern matching algorithm
  • 相关文献

参考文献13

  • 1Allen J, Christie A, Fithen W, et al. State of The Practice of Intrusion Detection Technologies[DB/OL].http://www.sei.cmu.edu/publications/docu ments/99.reports/99tr028/99tr028abstract.html,Jan,2000.
  • 2Cunningham R K, Lippmann R P, Webster S E. Detecting And Displaying Novel Computer Attacks With Macroscope[J]. Systems Man and Cybernetics,2001,30(14):275-281.
  • 3Herringshaw C. Detecting Attacks on Works[J].Computer, 1997,30(12):16-17.
  • 4Huang Jian-cai,Tian Jun-feng,Du Rui-zhong,et al. Research of Pattern Matching In Intrusion Detection[DB/OL]. http://ieeexplore.ieee.org/iel5/8907/28158/01259803.pdf,Nov,2003.
  • 5Ye N,Emran S M,Chen Q,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection[J].Computers,2002,51(7):810-820.
  • 6Erbacher R F,Walker K L,Frincke D A,et al. Intrusion and Misuse Detection in Large-scale Systems[J].Computer Graphics and Applications, 2002,22(1):38-47.
  • 7James Cannady.Artificial Neural Networks for Misuse Detection[DB/OL]. http://csrc.nist.gov/nissc/1998/proceedings/paperF13.pdf,Feb,1998.
  • 8Ennis R L,Griesmer J H,Hong S J,et al. A Conti-Nuous Real-Time Expert System for Computer Operations[DB/OL].http://www.research.ibm.com /journal/rd/301/ibmrd3001C.pdf,Jan,1986.
  • 9Internet Security System. Introduction to ISS RealSecure 6.0[DB/OL]. http://www.iss.net/education/pacasia/course_descriptions/iss_courses/real.secure.php,May,1998.
  • 10Internet Security System. Attack Signatures Glossary[DB/OL], http://download.iss.net/manuals/attacks25.pdf,May,1998.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部