期刊文献+

基于粗糙—遗传算法的入侵检测方法研究

Method of Intrusion Detection based on Genetic Algorithm and Rough Set
下载PDF
导出
摘要 提出一种基于遗传算法和粗糙集理论集合的入侵检测的新方法。该方法成功地把遗传-粗糙集理论引入到入侵检测中,比一般方法更适用于大信息量的网络平台的检测,可以快速准确地进行入侵检测。 This paper proposes an intrusion detection method based on genetic algorithm and rough set. This method succeeds in inducting genetic-rough set into the ways of intrusion detection, In comparing with the generic methods, this method is more applicable to the detection on Net-flat with vast information, and can detect efficiently and correctly.
出处 《现代计算机》 2006年第9期4-6,18,共4页 Modern Computer
基金 国家教育部留学回国人员科研专项基金项目(教外司留[2004]527号) 国家自然科学基金项目60564001 广西"十百千人才工程"基金项目2003207号
关键词 遗传算法 粗糙集 入侵检测 Genetic Algorithm Rough Set Intrusion Detection
  • 相关文献

参考文献4

  • 1Forrest S,Hofmeyr S A et al.A Sense of Self for Unix Processes.In:Proceedings of 1996 IEEE Symposium on Computer Security and Privacy,1996:120~128
  • 2Lee W,Stolfo S,Chan P.Learning Patterns from Unix Process Execution Traces for Intrusion Detection.In:Proceedings of AAAI Workshop:AI Approaches to Fraud Dection and Risk Management,1997:191~197
  • 3Wespi A,Dacier M et al.Intrusion Detection Using Variable Length Audit Trail Patterns.In:Proceedings of the 3rdInternational Workshop on the Recent Advances in Intrusion Detection(RAID'2000),Toulouse,France,2000:110~29
  • 4蔡忠闽,管晓宏,邵萍,彭勤科,孙国基.基于粗糙集理论的入侵检测新方法[J].计算机学报,2003,26(3):361-366. 被引量:57

二级参考文献8

  • 1Bace R. Intrusion Detection. New York: Macmillan Technical Publishing, 2000
  • 2Forrest S, Hofmeyr S A et al. A sense of self for Unix processes. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996. 120~128
  • 3Cohen W W. Fast effective rule induction. In: Proceedings of the 12th International Conference, Lake Taho, California, 1995. 115~123
  • 4Lee W, Stolfo S, Chan P. Learning patterns from Unix process execution traces for intrusion detection. In:Proceedings of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, 1997. 191~197
  • 5Wespi A, Dacier M et al. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), Toulouse, France, 2000. 110~129
  • 6Asaka M, Onabuta T, Inoue T, Okazawa S, Goto S. A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems,2001, E84D (5): 570~577
  • 7Pawlak Z . Rough Sets-Theoretical Aspect of Reasoning about Data. Dordrecht: Kluwer Academic Publishers, 1991
  • 8Vinterbo S,hrn A. Minimal approximate hitting sets and rule templates. International Journal of Approximate Reasoning, 2000, 25(2):123~143

共引文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部