期刊文献+

入侵检测中的归纳学习方法 被引量:2

Inductive Learning in Intrusion Detection
下载PDF
导出
摘要 结合使用着色Petri网和EDL语言描述攻击模型,该文给出了使用归纳学习对攻击模型进行泛化和特化操作,泛化后的模型可以检测出与已知攻击实例类似的未知攻击行为,实现了攻击知识库进行自动更新和扩展的方法。攻击实例首先使用EDL语言表述为一个攻击实例模型,对实例模型进行泛化得到攻击实例的3层概念空间,进而转化为着色Petri网模型,利用着色Petri网的运行机制对攻击行为进行检测。实验结果表明该方法对于具有相似攻击行为的未知攻击的检测非常有效。 This paper proposes the method for generalization and specialization of attack pattern using inductive learning, which can be used updating and expanding knowledge database. The attack pattern is established from an example by using the colored Petri net and EDL, after generalization it can be used to detect unknown attacks whose behavior are similar to the example. In practice the attack pattern first described by EDL from an example, then the pattern is generalized thus the concept spaces of attack are given and they can be transformed to Colored Petri net, when detection searches the intrusion from the top down by virtue of the concept space of the attack pattern. In fact the concept space of pattern indicates a depth-first search way.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第16期125-126,162,共3页 Computer Engineering
关键词 入侵检测 归纳学习 着色PETRI网 泛化 特化 Intrusion detection Inductive learning Colored Petri net Generalization Specialization
  • 相关文献

参考文献7

  • 1Jones A K, Sielken R S. Computer System Intrusion Detection:A Survey[EB/OL]. http://www.cs.virginia.edu/-jones/IDS-research/Documents/jones-sielken-survey-v 11.pdf, 2000.
  • 2Allen J, Christie A, Fithen W, et al. State of the Practice of Intrusion Detection Technologies[R]. Carnegie Mellon University,Technical Report: CMU/SEI-99-TR-028, 2000.
  • 3Kumar S. Classification and Detection of Computer Intrusions[D].Hammod, Indiana: Department of Computer Sciences, Purdue University, 1995-08: 21-71.
  • 4Slagell M. The Design and Implementation of MAIDS[D]. Ames:Iowa State University, 2001-05: 1-101.
  • 5Peishun L, Dake H. Worm Detection using CPN[C]. Proc. of 2004's IEEE International Conference on Systems, Man and Cybernetics, 2004-10: 4941-4946.
  • 6蒋昌俊,阎春钢.并发表达式与安全标号Petri网[J].电子学报,1998,26(8):83-85. 被引量:5
  • 7Symantec Security Response, W32 Blaster Worm[EB/OL]. http://www.S ymantec.com/region/cn/techsupp/avcenter/venc/data/cn- W 32.Blaster.worm.html, 2006.

二级参考文献3

  • 1陆汝钤,中国科学.A,1990年,20卷,9/10期,992页
  • 2Jiang C J,Sci China E,1996年,39卷,1期,50页
  • 3陆维明,中国科学.A,1993年,23卷,2期,219页

共引文献4

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部