期刊文献+

网络入侵检测系统的模糊规则学习模型 被引量:1

Fuzzy Rule Study Model of Network Intrusion Detection System
下载PDF
导出
摘要 从如何完善和改进网络入侵检测系统的检测规则方面着眼,分析了入侵检测系统漏识和误识的原因,建立了一个网络入侵检测系统的模糊规则学习模型。文章首先证明了噪声环境下入侵行为的相似关系。并以入侵检测系统原有检测规则为基础,创建了基于权重的模糊检测规则。同时提出了一个反馈误差学习算法,用于对模糊检测规则进行改进以求达到识别的最优。模型可以方便地应用于各种基于规则的入侵检测系统。 This paper analyzes the cause of false-alarm and low detection rate of the intrusion detection systems. From the angle of mending the imprecision problem of detection rules, it creates a fuzzy rule study model for network intrusion detection system. First proved the equivalence relation of the intrusion actions in the noise environment. From the origin rules of the existing intrusion detection system, creates weight-based fuzzy detection rules. And a feedback study algorithm is proposed, with which it modifies the fuzzy detection rules to get the optimal results of recognition. This model can be easily applied in all kinds of existing ruled-based intrusion detection systems.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第9期21-22,154,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2002AA142010)
关键词 入侵检测 模糊检测规则 反馈学习 Intrusion detection Fuzzy detection rule Feedback study
  • 相关文献

参考文献8

  • 1Denning D E.An Intrusion Detection Model.IEEE Transaction on Software Engineering,1987,2(2):222-232
  • 2Lippmann R,Haines J W,Fried D J,et al.The 1999 DARPA On-line Intrusion Detection Evaluation.Computer Networks ,2000,34: 579-595
  • 3Jonsson E,Olovsson T.A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior.IEEE Transactions on Software Engineering,1997,24(4):235-245
  • 4Keyley D L,Bouchard J F.DARPA Information Assurance Program Dynamic Defense Experiment Summary.IEEE Transactions on Systems,Man,and Cybernetics-Part A: Systems and Humans,2001,31(4)
  • 5Biermann E,Cloete E,Venter L M.A Comparison of Intrusion Detection Systems.Computers&Security,2001,20: 676-683
  • 6Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service: Eluding Network Intrusion Detection.http://www.robertgraham.com/ mirror/ Ptacek-Newsham-Evasion- 98.html
  • 7Ilgun K,Kemmerer R A.State Transition Analysis: Arule-based Intrusion Detection Approach.IEEE Transactions on Software Engineering,1995,21(3)
  • 8王松桂.线性模型的理论及其应用[M].合肥:安徽教育出版社,1998..

同被引文献6

  • 1凌永发,王杰,陈跃斌.计算机入侵检测技术应用研究[J].微计算机信息,2006,22(03X):53-55. 被引量:18
  • 2JEAN-PHILIPPE.Application of Neural Networks to Intrusion Detection,[EP/OL]http://www.sans.org,Retrieved -23-02-2004.
  • 3YAO YU,GAO FU-XIANG,YU GE.HYBRID BPCNN neural network for intrusion detection[C].Proceedings of the 3rd international conference on Information security.Nov.2004.
  • 4TAKAGI T,SUGENO M.Fuzzy Identification of Systems and its Application to Modeling and Control [J].IEEE Transaction Systems, Man, and Cybernetics, 1985,15(1): 116-132.
  • 5Information and Computer Science University of California. KDD Cup 1999 Data[EB/OL].http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, 1999.
  • 6李之棠,李家春.模糊神经网络在入侵检测中的应用[J].小型微型计算机系统,2002,23(10):1235-1238. 被引量:16

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部