期刊文献+

基于攻击严重性的模糊入侵检测系统模型 被引量:1

Fuzzy Intrusion Detection System Model Based on Attack Severity
下载PDF
导出
摘要 分析了影响攻击严重性的主要模糊信息,提出了一种基于攻击严重性的具有模糊判决能力的入侵检测系统模型,并给出了相应的模糊比例微分积分规则产生器结构模型。最后讨论了该模型的特性。 This thesis presents a new intrusion detection model called the fuzzy intrusion detection model based on attack severity that has the ability of fuzzy decision, analyses the main kinds of fuzzy information that influences the attack severity, gives some corresponding fuzzy proportion derivability integral rules structure model. At last, it discusses the merits and demerits of this model.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第14期100-102,共3页 Computer Engineering
基金 云南省自然科学基金资助项目(2002C0002Z)
关键词 入侵检测 攻击严重性 规则产生器 代理 Intrusion detection Attack severity Rules generator Agent
  • 相关文献

参考文献9

  • 1[1]Northcutt S. Network Intrusion Detection: An Analyst's Handbook.New Riders Publishing, 1999
  • 2[2]Heady R, Luger G, Maccabe A, et al. The Architecture of a Networklevel Intrusion Detection System. Technical Report, CS90-20, Dept. of Computer Science, University of New Mexico, Albuquerque,NM 87131
  • 3[3]Kanlayasiri U, Sanguanpong S, Jaratmanachor W. A Rule-based Approach for Port Scanning Detection. Department of Computer Engineering, Faculty of Engineering, Kasetart University, Chatuchak,Bangkok, 2000
  • 4[4]Kurnar S. Classification and Detection of Computer Intrusion(Ph.D.Thesis). Department of Computer Sciences, Purdue University, W.Lafayette, 1995
  • 5[5]Fyodor. The Art of Port Scanning. Phrack Magazine, 1997, 7(5)
  • 6[6]Verwoerd T, Hunt R. Intrusion Detection Techniques and Approaches.Department of Computer Science, University of Canterbury, 2001-12
  • 7[7]Denning D E. An Intrusion-detection Model. IEEE Transaction on Software Engineering, 1987, SE- 13(2)
  • 8[8]LA扎得.模糊集合、语言变量及模糊逻辑.北京:科学出版社,1990
  • 9[10]http:∥kdd.ies.uci.edu/databases/kddcup99/kddcup99.html.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部