期刊文献+

一种Windows主机入侵检测实验系统 被引量:7

Windows Host Intrusion Detection Experimental System
下载PDF
导出
摘要 针对广泛使用的Windows平台,建立了一个基于主机的入侵检测实验系统。在深入分析Windows主机的安全特性的基础上,利用安全日志、系统日志、性能日志及文件完整性校验、注册表等多种信息,提出了18项入侵检测特征,并利用支持向量机建立入侵检测器,实现了对多种攻击的检测。实验结果表明,特征选取合理、检测方法有效。 A kind of intrusion detection experimental system on the widely used Windows platform is put forward. On the basis of a thorough analysis of Windows' security properties, 18 variables are suggested to be extracted as intrusion features from Windows' security log, system log, performance log, file integrity check, the changes of registry keys et al, and then support vector machines are used as intrusion detector to find out all sorts of intrusions. The experiment results demonstrate that the extracted features are reasonable selected and the detection method is effective.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第10期132-134,共3页 Computer Engineering
基金 国家重点基础研究发展规划基金资助项目(2002CB312200) 教育部高校博士点基金资助项目(20040251010) 广西自然科学基金资助项目(桂科基0575094)
关键词 入侵检测系统 异常检测 Windows主机 特征选取 支持向量机 Intrusion detection system Anomaly detection Windows host Feature selection Support vector machines
  • 相关文献

参考文献4

二级参考文献32

  • 1王行愚.在虚拟与现实之间——自动化若干发展方向刍议[J].自动化学报,2002,28(S1):77-84. 被引量:7
  • 2张学工译.统计学习理论的本质[M].北京:清华大学出版社,1995..
  • 3何倩.[D].桂林:桂林电子工业学院,2004—03.
  • 4Andrew H Sung.Identify important features for intrusion detection using support vector machines and neural networks[C].In:IEEE Proceedings of the 2003 Symposium on Application and the Internet, 2003.
  • 5Mukkamala Srinivas, Janoski Guadalupe, Sung Andrew.Intrusion detection using neural networks and support vector machines[C].In:Proceedings of the International Joint Conference on Neural Networks, vol.2,2002 : 1702-1707.
  • 6Botha Martin,von Solms Rossouw.Utilizing fuzzy logic and trend analysis for effective intrusion detection[J].Computers and Security, 2003 ; 22 (5) : 423-434.
  • 7Bala Jerzy,Baik Sung,Hadjarian Ali et al.Application of a distributed data mining approach to network intrusion detection[C].In:Proceedings of the Intematlonal Conference on Autonomous Agents, 2002:1419-1420.
  • 8Hossain Mahmood,Bridges Susan M,Vaughn Jr et al.Adaptive intrusion detection with data mining[C].In :Proc of the IEEE Int Conf on Systems,Man and Cybernetics,vol.4,2003:3097-3103.
  • 9Tim Bass.Intrusion Detection Systems Multisensor Data Fusion Creating Cyberspace Situational Awareness.http ://citeseer. nj.nec.com/ bass00intrusion.html 2001.
  • 10Wang Yong,Yang Huihua,Wang Xingyu.Distributed Intrusion Detection System Based on Data Fusion Method[C].In:The 5th World Congress on Intelligent Control and Automation(WCICA'04),Hangzhou, China, 2004.

共引文献92

同被引文献47

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部