期刊文献+

基于机器学习的入侵检测系统 被引量:1

The Intrusion Detetection System Based On Mechine Learning
下载PDF
导出
摘要 针对现有入侵检测系统存在的不足,研究了基于网络和误用的入侵检测系统Snort,提出了基于机器学习的Snort系统方案,使Snort不仅能通过模式匹配的方式检测到一些已知的攻击,还能通过自我学习检测到未知的攻击。 Aiming at some problems in current intrusion detection technique, this paper proposes a general intrusion detection system based on machine learning, and researches on the intrusion detection systenl - Snort based on the network and misuse. A plan of Snort learning systein based on the machine is put forward, so that the machine learning - based .Snort system can not (rely detect the known attacks by pattern matching, hut also detect the unknown attacks by self learning.
作者 蒋道霞
机构地区 南京理工大学
出处 《淮阴工学院学报》 CAS 2005年第1期23-25,共3页 Journal of Huaiyin Institute of Technology
关键词 入侵检测系统 机器学习 神经网络 SNORT Intrusion Detection System Machine Learning Neural Network Snort
  • 相关文献

参考文献8

二级参考文献20

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
  • 10Tan K,Intrusion Detection Systems and a View to Its Forensic Application

共引文献100

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部