期刊文献+

一种基于费歇(Fisher)判别法的异常检测模型设计

Design of an anomaly detection model based on Fisher-discriminance
下载PDF
导出
摘要 网络上的入侵事件层出不穷,这对信息资源的安全构成了严重威胁。应对这些恶意行为的重要措施之一就是入侵检测。该技术的一个重要分支———异常入侵检测技术在目前的网络安全领域研究中十分活跃。文中提出一种基于统计理论———费歇(Fisher)判别法的异常入侵检测模型,该模型与其他的异常检测模型相比,在对异常事件响应能力的实时性与精确性方面有了较为显著的提高,应用该模型也简化了入侵检测系统设计的复杂性。 With the growth of the Internet, events of intrusion become more and more usual, which does serious harm to information resources. To prevent these malicious behaviors, one of the important measures is the intrusion detection technique. In recent years, anomaly detection - an important branch of intrusion detection is a highlighted topic in the studies of the network security. Based on the Fisher-discriminance, a statistical theory, a novel anomaly detection model, which, compared with other anomaly detection models, would improve apparently the performance in real-time and accuracy was presented. Also, the complexity in the design of intrusion detection system would be simplified when this model was employed.
出处 《计算机应用》 CSCD 北大核心 2004年第12期78-81,共4页 journal of Computer Applications
关键词 网络安全 入侵检测 费歇判别法 异常检测 network security intrusion detection Fisher-discriminance anomaly detection
  • 相关文献

参考文献8

  • 1SHYU ML, CHEN SC, SARINNAPAKORN K, et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier[A]. Proceedings of IEEE Foundations and New Directions of Data Mining Workshop in conjunction with the Third IEEE International Conference o
  • 2HEADY R, LUGER G, MACCABE A, et al. The architecture of a network level intrusion detection system[R]. Technical report, Computer Science Department, University of New Mexico, August 1990.
  • 3JAVITZ HS, VALDES A. The SRI Statistical Anomaly Detector[A]. Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy[C], May 1991.
  • 4LIPPMANN RP, FRIED DJ, GRAF I, et al. Evaluating Intrusion Detection Systems:The 1998 DARPA Off-line Intrusion Detection Evaluation[A]. Proceedings DARPA Information Survivability Conference and Exposition (DISCEX) 2000[C]. IEEE Computer Society Press, CA
  • 5TAYLOR C, HARRISON W, KRINGS A, et al. Low-Level network attack recognition: a signature-based approach[A]. Proceedings of 13th 6IASTED Int. Conference on Parallel and Distributed Computed Computing and Systems (PDCS 2001)[C]. Anaheim. California, August
  • 6YE N, CHEN Q. An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems[J]. Quality and Reliability Eng.Int'l, 2001, 17(2):105-112.
  • 7YE N, EMRAN SM, CHEN Q, et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection[J]. IEEE Transactions on Computers, 2002, 51(7).
  • 8http:// packetstormsecurity.nl/DoS/index size.html[EB/OL], March 2000.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部