一种网络入侵特征描述的方法
摘要
网络入侵行为特征的描述是设计入侵检测系统的前提和关键,而它往往又是研究入侵检测技术的难点.本文在模糊理论的基础上给出了一种有效的描述方法.
出处
《邵阳学院学报(自然科学版)》
2006年第2期62-63,共2页
Journal of Shaoyang University:Natural Science Edition
参考文献4
-
1张勇,欧阳明光,潘峰,汪为农.基于免疫原理的多代理网络入侵检测系统的设计[J].计算机应用与软件,2004,21(9):1-2. 被引量:4
-
2潘峰,欧阳明光,汪为农.利用系统调用序列检测入侵的一种新方法[J].上海交通大学学报,2004,38(1):26-28. 被引量:8
-
3刘礼加,欧阳明光,潘峰,张勇,汪为农.免疫原理驱动的入侵检测系统框架[J].计算机工程与应用,2003,39(10):141-143. 被引量:2
-
4李之棠,杨红云.模糊入侵检测模型[J].计算机工程与科学,2000,22(2):49-53. 被引量:50
二级参考文献16
-
1[1]Jungwon Kim,Peter Bentley. The Human Immune System and Network Intrusion Detection[C]In:7th European Conference on Intelligent Techniques and Soft Computing(EUFIT'99),Aachen,Germany
-
2[2]Steven A Hofmeyr,Stephanie Forrest. Architecture for an Artificial Immune System[C]In:Submitted to Evolutionary Computation
-
3[3]Jungwon Kim,Peter Bentley.The Artificial Immune Model for Network Intrusion Detection[C].In:7th European Conference on Intelligent Techniques and Soft Computing(EUFIT'99),Aachen,Germany
-
4[4]Steven A Hofmeyr,Stephanie Forrest. Immunity by Design:An Artificial Immune System[C].In:Proc of GECCO99,1999:1289~1296
-
5[5]Leandro Nunes de Castro,Fernando Jose Von Zuben.Artificial Immune Systems:Part I-Basic Theory And Application [R].Technical Report RT-DCA 01/99,1999
-
6[1]Axelsson S. Intrusion detection systems: A survey and taxonomy [EB/OL]. http: //citeseer. nj. nec.com/axelsson00intrusion. html, 2000.
-
7[2]Forrest S, Hofmeyr S A, Somayaji A. A sense of self for unix process[A]. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy [C].Oakland, California: IEEE Computer Society Press,1996. 120-128.
-
8[3]Lee W, Stolfo S J, Chan P K. Learning patterns from unix process execution traces for intrusion detection[A]. Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management[C]. Menlo Park:CA, AAAI Press,1997.50-56.
-
9[4]Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls :alternative data models [A]. Proceedings of 1999 IEEE Symposium on Security and Privacy[C]. Oakland California:IEEE Computer Society Press, 1999. 133- 145.
-
10[5]Ghosh A K, Schwartzbard A, Shatz A M. Learning program behavior profiles for intrusion detection [A]. Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring[C]. Santa Clara, CA :IEEE Computer Society Press, 1999.
共引文献60
-
1李益发,吕嘉祥.生物免疫原理在多代理分布式入侵检测系统中的应用[J].大连理工大学学报,2005,45(z1):132-135.
-
2赵军.基于模糊综合决策的计算机入侵检测技术[J].硅谷,2009,2(6).
-
3SHIShu-dong,LIZhi-tang.A High-Speed Information Retrieval System[J].Wuhan University Journal of Natural Sciences,2004,9(4):425-428.
-
4翟素兰,郑诚,乐毅.用改进的权值树进行入侵检测[J].微机发展,2004,14(12):62-64. 被引量:2
-
5陈漫红.入侵检测技术综述[J].广东自动化与信息工程,2004,25(4):1-3.
-
6伊静,刘培玉.基于模糊方法的入侵检测系统研究[J].信息技术与信息化,2004(6):14-16. 被引量:3
-
7岳大为,熊家军.一种基于多代理技术的入侵检测系统模型[J].空军雷达学院学报,2001,15(4):45-48.
-
8李家春,李之棠.动态网络安全模型的研究[J].华中科技大学学报(自然科学版),2003,31(3):40-42. 被引量:16
-
9余建桥,张林,彭喜化.基于Minkowskey距离的模糊入侵检测方法研究[J].计算机科学,2003,30(11):102-103. 被引量:2
-
10何小东,梁小丽.网络入侵免疫系统研究的新进展[J].电子技术应用,2005,31(10):1-4. 被引量:1