期刊文献+

一种网络入侵特征描述的方法

下载PDF
导出
摘要 网络入侵行为特征的描述是设计入侵检测系统的前提和关键,而它往往又是研究入侵检测技术的难点.本文在模糊理论的基础上给出了一种有效的描述方法.
作者 颜小琼
机构地区 邵阳学院
出处 《邵阳学院学报(自然科学版)》 2006年第2期62-63,共2页 Journal of Shaoyang University:Natural Science Edition
  • 相关文献

参考文献4

二级参考文献16

  • 1[1]Jungwon Kim,Peter Bentley. The Human Immune System and Network Intrusion Detection[C]In:7th European Conference on Intelligent Techniques and Soft Computing(EUFIT'99),Aachen,Germany
  • 2[2]Steven A Hofmeyr,Stephanie Forrest. Architecture for an Artificial Immune System[C]In:Submitted to Evolutionary Computation
  • 3[3]Jungwon Kim,Peter Bentley.The Artificial Immune Model for Network Intrusion Detection[C].In:7th European Conference on Intelligent Techniques and Soft Computing(EUFIT'99),Aachen,Germany
  • 4[4]Steven A Hofmeyr,Stephanie Forrest. Immunity by Design:An Artificial Immune System[C].In:Proc of GECCO99,1999:1289~1296
  • 5[5]Leandro Nunes de Castro,Fernando Jose Von Zuben.Artificial Immune Systems:Part I-Basic Theory And Application [R].Technical Report RT-DCA 01/99,1999
  • 6[1]Axelsson S. Intrusion detection systems: A survey and taxonomy [EB/OL]. http: //citeseer. nj. nec.com/axelsson00intrusion. html, 2000.
  • 7[2]Forrest S, Hofmeyr S A, Somayaji A. A sense of self for unix process[A]. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy [C].Oakland, California: IEEE Computer Society Press,1996. 120-128.
  • 8[3]Lee W, Stolfo S J, Chan P K. Learning patterns from unix process execution traces for intrusion detection[A]. Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management[C]. Menlo Park:CA, AAAI Press,1997.50-56.
  • 9[4]Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls :alternative data models [A]. Proceedings of 1999 IEEE Symposium on Security and Privacy[C]. Oakland California:IEEE Computer Society Press, 1999. 133- 145.
  • 10[5]Ghosh A K, Schwartzbard A, Shatz A M. Learning program behavior profiles for intrusion detection [A]. Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring[C]. Santa Clara, CA :IEEE Computer Society Press, 1999.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部