期刊文献+

可扩展的异常检测系统的研究与实现 被引量:1

Research and implementation of extensible anomaly-based detection systems
下载PDF
导出
摘要 提出了可扩展的基于异常的入侵检测检测系统的体系结构,系统采用分布式结构及灵活的插件机制,可以方便地扩充检测功能,具有很好的可扩展性。实现了3种基于异常的检测算法,即相等匹配、数据挖掘、神经网络,为检测未知特征模式的攻击提供了较为有效的手段。 A novel framework, extensible anomaly-based detection systems (EAIDS) is described, for implementing several techniques for intrusion detection based on anomaly detection. The architecture of EAIDS is extensible because EAIDS utilizes a flexible modular plug-in architecture. Three anomaly detection algorithms, i.e., equality matching, data mining and artificial neural networks are introduced, which provides efficient methods for detecting unknown intrusion.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第7期1722-1725,共4页 Computer Engineering and Design
基金 天津市自然科学基金项目(013800211)。
关键词 入侵检测系统 异常检测 相等匹配 数据挖掘 神经网络 IDS anomaly-based detection equality matching data mining artificial neural networks
  • 相关文献

参考文献7

  • 1肖建华,张建忠,吴功宜.基于移动Agent的分布式入侵检测系统的体系研究[J].计算机科学,2002,29(8):39-40. 被引量:4
  • 2辛颖,徐敬东,肖建华.基于统计的异常检测引擎分析[J].计算机应用,2002,22(10):48-50. 被引量:6
  • 3Forrest S, Hofmeyr S A, Somayaji A. A sense of self for unix processes [J]. IEEE Transactions on Software Engineering,1996,13(2):222-232.
  • 4Lee W, Xiang D. Information-theoretic measures for anomaly detection[C]. Oakland, CA, USA:Proc of the 2001 IEEE Symposium on Security and Privacy,2001.130-143.
  • 5William W Cohen. Fast effective rule induction[C]. Proc of the12th International Conference on Machine Learning, Lake Taho,CA, Morgan Kaufmann, 1995. 115-123.
  • 6Ghosh A, Wanken J, Charron F. Detecting anomalous and unknown intrusions against program[C].Proc of the 14th Annual Computer Security Applications Conference, Scottsdale, AZ,1998.259-267.
  • 7肖建华,张建忠,辛颖,周思儒,吴功宜.MAIDS系统中的检测功能模块[J].计算机工程,2003,29(13):69-70. 被引量:1

二级参考文献6

  • 1Bace R, Mell P. NIST Special Publication on Intrusion Detection Systems, 2000.
  • 2Crosbie M, Spafford G. Active Defense of a Computer System Using Autonomous Agent. Technical Report 95-008,1995-02.
  • 3Bace R,Mell P. Intrusion Detection Systems. NIST Special Publi cation on Intrusion Detection Systems. 1999
  • 4Huhns M N. Mobile Agents. IEEE Internet Computing, May. June 1997
  • 5http://www. focus. gmd. de/usr/covaci. The First Reference Implementation of the OMG MASIF -Mobile A gent System Inter operability Facility, 1998
  • 6肖建华,张建忠,吴功宜.基于移动Agent的分布式入侵检测系统的体系研究[J].计算机科学,2002,29(8):39-40. 被引量:4

共引文献8

同被引文献9

  • 1张雪芹,顾春华,林家骏.入侵检测技术的挑战与发展[J].计算机工程与设计,2004,25(7):1096-1099. 被引量:14
  • 2彭新光,马晓丽.会话属性优化的网络异常检测模型[J].计算机工程与设计,2005,26(11):2945-2948. 被引量:2
  • 3王成,刘金刚,刘汉武.网络中突发业务自相似建模及其Hurst系数估计[J].计算机工程,2006,32(2):101-103. 被引量:9
  • 4Kendall K.A database of computer attacks for the evaluation of intrusion detection systems[D].Boston:Massachusetts Institute of Technology,1999.
  • 5Park K,Willinger W.Self-similar network traffic:An overview,self-similar network traffic and performance evaluation[C],New York:Wiley-Interscience,2000.1-39.
  • 6Morris R,Lin D.Variance of aggregated web traffic[C].Proceedings of IEEE INFOCOM 2000.360-366.
  • 7Kettani H.A novel approach to the estimation of the long-range dependence parameter[D].University of Wisconsin-Madison,2000.
  • 8Abry P,Flandrin P,Taqqu MS,et al.Wavelets for the analysis,estimation and synthesis of scaling data[Z].Boston,2000.134-156.
  • 9Park K,Willinger W.Self-similar network traffic:An overview self-similar network traffic and performance evaluation[M].New York:John Wiley and Sons,2000.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部