期刊文献+

入侵检测系统优化配置研究

Research on Optimizing Configuration for IDS
下载PDF
导出
摘要 入侵检测系统的优化配置是当前IDS研究的新兴领域。结合IDS的具体目标,在分析已有的基于最优敏感度的优化配置方法的基础上对该方法进行了改进。然后通过决策树引入成本,提出考虑更为全面的基于成本的入侵检测系统配置方法。最后,通过实验分别对这三种方法进行测试,并对结果进行分析。 Optimizing configuration for intrusion detection system (IDS) is a new research area for IDS. Based on analysis of the optimizing configuration of Perfect - Sensitivity, the methods with specific goal are improved for IDS.And referring to the cost through Decision Tree, this research presents a new and optimal configuration method for IDS based on the cost. Finally, the experiments were made to test the three methods and the result was analyzed to show the validity.
作者 唐华 曾碧卿
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第3期43-46,共4页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家自然科学基金项目资助(60573127) 华南师范大学南海校区2006年重点项目(N06Z013)
关键词 入侵检测 决策树 优化配置 成本 最优敏感度 IDS decision tree optimizing configuration cost perfect sensitivity
  • 相关文献

参考文献10

二级参考文献84

  • 1胡宏银 朱绍文 等.从数据库中获取信息的几种方法比较.1999年中国智能自动化学术会议论文集[M].北京:清华大学出版社,1999.812-817.
  • 2[1]Stolfo S J,Fan Wei,Lee Wenke.Cost-based modeling for fraud and intrusion detection:results from the JAM project.In:Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00),2000
  • 3[2]Lee Wenke,Fan Wei,Miller M,et al.Toward cost-sensitive modeling for intrusion detection and response.Workshop on Intrusion Detection and Prevention,7th ACM Conference on Computer Security,Athens,GR:November,2000
  • 4[3]Northcutt S.Network intrusion detection:an analyst's handbook.New Riders,1999
  • 5[4]Lindqvist U,Jonsson E.How to systematically classify computer security intrusions.In:Proceedings of the IEEE Symposium on Research in Security and Privacy,Oakland CA,May 1997
  • 6[5]Gaffney J E.,Ulvila J W.Evaluation of intrusion detectors:a decision theory approach.IEEE,2001
  • 7胡宏银,1999年中国智能自动化学术会议论文集,1999年,812页
  • 8Jou Yfrank,Rome Lab USA Tech Rep:CDRL A005 1997
  • 9Korba J. Windows NT Attacks for the Evaluation of Intrusion Detection Systems [EB/OL]. http://www. 11. mit. edu/IST/ideval/pubs/2000/jkorba_thesis. pdf
  • 10Lippmann R, Haines J, Fried D et al. The 1999 DARPA OffLine intrusion detection evaluation [J]. Computer Networks,2000, 34(4): 579-595.

共引文献362

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部