期刊文献+

网络入侵异常检测的实时方法 被引量:4

Real-time Anomaly Detection of Network Intrusions
下载PDF
导出
摘要 目前市面上的入侵检测系统一般都是基于特征匹配,不能对未知入侵进行有效检测,异常检测可以较好地检测未知入侵。M IT林肯实验室提出了一种离线的异常入侵检测方法,但不能据此建立实际的入侵检测系统,为此,提出一种能实时检测网络异常的入侵检测方法。该方法可以实时重建网络连接,提取每一连接的31个与入侵有关的特征,运用支持向量机进行在线检测,实验结果表明,该方法是有效的,检测精度在95%以上。为缩短入侵检测时间,对最短检测时间进行了研究,提出了最优入侵检测时间算法,根据此算法得出局域网内的异常连接在250m s内即可较准确地检测出。 Most of IDS in current use are based on feature match. They usually appear incapable of detecting unknown intrusion. Anomaly detection can efficiently undertake the work of unknown intrusion detection. MIT's Lincoln Laboratory presented a well-renowned off-line intrusion detection scheme, but it couldn't lend itself to establishing a real-time intrusion detection system (IDS). As a response to this problem, we introduce in this paper a novel real-time IDS method. It dynamically reconstructs the TCP connections, extracts 31 intrusion features, and uses support vector machines as detector. The experiments show that the detection accuracy is above 95 %. In order to cut down detect time, we present an algorithm to search best time for detection intrusion. A series of network intrusion experiments have demonstrated that the proposed method can precisely detect intrusions occurring in a local area network within 250 ms.
出处 《桂林电子工业学院学报》 2005年第5期1-5,共5页 Journal of Guilin Institute of Electronic Technology
基金 广西区教育厅资助项目(编号:D20126)
关键词 异常检测 实时检测 入侵特征 支持向量机 anomaly detection, real-time detection, intrusion feature, support vector machines
  • 相关文献

参考文献5

  • 1Matthew V M, Philips K C.An analysis of the 1999 DARPA/Lincoln laboratories evaluation data for network anomaly detection[E/OL].Florida Institute of Technology Technical Report TR-CS-2003-02, http://www.cs.fit.edu/~mmahoney.
  • 2Andrew H.Sung.Identify important features for intrusion detection using support vector machines and neural networks[A].IEEE Proceedings of the 2003 Symposium on Application and the Internet[C], 2003.
  • 3李辉,管晓宏,昝鑫,韩崇昭.基于支持向量机的网络入侵检测[J].计算机研究与发展,2003,40(6):799-807. 被引量:79
  • 4陈光英,张千里,李星.基于SVM分类机的入侵检测系统[J].通信学报,2002,23(5):51-56. 被引量:40
  • 5Cohen F B.Simulating cyber attacks,defenses,and consequences[E/OL].The Infosec Technical Baseline Studies,March 1999.

二级参考文献2

  • 1张千里.CCERT的建议和入侵检测系统的研究[M].北京:清华大学,2000..
  • 2张学工译.统计学习理论的本质[M].北京:清华大学出版社,1995..

共引文献109

同被引文献35

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部