期刊文献+

基于前馈多层感知器的网络入侵检测的多数据包分析 被引量:5

Multiple data packet analysis of network intrusion detection system based on multilayer forward neural network
下载PDF
导出
摘要 提出了一种新型网络入侵检测模型,在该模型中,首先将截获的数据包结合历史数据包数据库进行协议分析,找出可能存在的入侵行为的相关数据包,然后采用前馈多层感知器神经网络对这些相关的数据包进行回归分析,最终获得检测结果。该模型与传统采用单数据包检测方式的网络入侵检测系统(NIDS)模型相比,具有更低的漏检率。 A new network intrusion detection model was proposed. Based on the model, the currently data packet was integraed with historical data packet to process a protocol analysis, then the data packet that correlated with possiblely intrusion affair could be found out. The multilayer forward neural network was used to process a regression analysis to such data packets and got the results of intrusion detection. With the new model based on multiple data packet, the missed rate of traditional network intrusion detection system was decreased.
出处 《计算机应用》 CSCD 北大核心 2006年第4期806-808,共3页 journal of Computer Applications
基金 湖南省自然科学基金委资助项目(03JJY3104)
关键词 网络入侵检测系统 数据挖掘 前馈多层感知器 协议分析 Network Intrusion Detection System(NIDS) data mining Multiple-Level Perception(MLP) protocol analysis
  • 相关文献

参考文献8

  • 1MUKHERJEE B, HEBERLEIN LT, LEVITT KN. Network intrusion detection[J]. IEEE Network, 1994, 8(3) : 26 -41.
  • 2WANG L, YU G. WANG G, et al. Method of evolutionary neural network-based intrusion detection[ A]. International Conferences on Info-tech and Info-net, ICII 2001[ C]. Beijing. 2001.13 - 18.
  • 3LEE W , STOLFO SJ , MOK KW . A Data Mining Framework for Building Intrusion Detection Models[ A]. IEEE Symposium on Security and Privacy[ C]. 1999. 120 - 132.
  • 4CANNADY J. Neural networks for misuse detection: Initial results[ A]. Proceedings of intrusion detection 98 Conference[ C]. Louvainla-Neuve: IEEE Press, 1998.31 -47.
  • 5HOFMANN A, SCHMITZ C, SICK B, Rule extraction from neural networks for intrusion detection in computer networks Systems[ A].IEEE International Conference on Man and Cybernetics[ C]. 2003.1259 - 1265,
  • 6MUKKAMALA S, JANOSKI G, SUNG A. Intrusion detection using neural networks and support vector machines Neural Networks[ A].Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN '02[ C]. 2002. 1702 - 1707.
  • 7KANG B-D, LEE J-W, KIM J-H, et al. An intrusion detction system using principal component analysis and time delay neural network[ Z]. Enterprise networking and Computing in Healthcare Industry,HEALTHCOM, 2005.
  • 8WANG J, WANG Z, DAI K. A network intrusion detection system based on the artificial neural networks[ A]. Proceedings of the 3rd international conference on Information security[ C], 2004.

同被引文献38

  • 1周晔,杨天奇.一种基于置信度的异常检测模型与设计[J].计算机仿真,2005,22(1):167-169. 被引量:6
  • 2张振国,张楠.基于ICMP的网络攻击与防范[J].微计算机信息,2005,21(07X):77-79. 被引量:7
  • 3蔡凌.IP欺骗攻击[J].网络安全技术与应用,2006(1):28-30. 被引量:4
  • 4Anderson J P.Computer security threat monitoring and surveillance[R].Fort Washington:Technical Report,James P Anderson Co,1980.
  • 5Denning D.An intrusion deteetion model[J].IEEE Transaction on Software Engineering,1987,13(2):222-232.
  • 6甲乙丙丁.BM算法详解及C语言实现[EB/OL].(2010-02-11)[2010-05-06].http://blog.sina.com.cn/s/blog_5059be880100hc9l.html.
  • 7温显斌,张桦,张颖,等.软计算及其应用[K].天津:天津理工大学,2009.
  • 8Mukherjee B,Heberlein LT,Levitt KN. Network Intursion Detection[J]. IEEE Network,1994.8(3):26-41.
  • 9Ertoz L, Eilertson E, Lazarevic A, Tan P, Dokas P,Srivastava J, Kumar. Detection and Summarization of Novel Network Attcaks using Data Mining[R]. Technical Report,2003.
  • 10MUKHERJEE B,HEBERLEIN T L,LEVITT K N. Network intrusion detection[J ]. IEEE Trans on Network, 1994,8(3) :26 - 41.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部