期刊文献+

基于遗传的审计跟踪算法的研究

Research on trail algorithm of security audit based on genetic algorithm
下载PDF
导出
摘要 安全审计是保护计算机遭受恶意攻击的重要技术之一。安全审计系统利用跟踪策略来实现对用户行为的跟踪。但是由于先验知识的局限,对于管理员来说很难为每个用户制定准确地跟踪策略。介绍了一种基于遗传的审计跟踪算法解决此类问题。实验证明,该算法具有实用性,并能以算法精度上损失可接受的代价(接近最优解80%以上)极大的提高算法的运行时间。使得该方法可以用在大规模多用户的环境。 Security audit is one of the most important techniques to protect computer from misuse and malicious attack.Security audit system uses trail rules to trace the users' action.Unfortunately,it is difficult for administrator to set the accurate rules for every user because of the lack of the priori knowledge.This paper introduces genetic algorithm-based trail algorithm to solve this kind of intractable problems.Experiments show thai the algorithm is usable and the performance of the approach has been improved greatly at the acceptable cost of the accuracy (80%).It helps on the security audit system to process the increasing number of the audit data and users.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第34期132-135,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(the National High- Tech Research and Development Plan of China under Grant No.2005AA145110 No. 2002AA145090)。
关键词 信息安全 安全审计系统 数据挖掘 遗传算法 information security security audit system data mining genetic algorithm
  • 相关文献

参考文献15

  • 1Fort G G,Meade M D.Department of defense trusted computer system evaluation criteria,DOD Directive 5200.28-STD [S].National Computer Security Center, 1985-12.
  • 2Zhou Chun-lai,Li Zhi-gang,Meng Yue-jin,et al.A data mining algorithm based on rough set theory[C]//Proeeedings of 2004 International Conference on Information Acquisition,2004.
  • 3Debar H,Dacier M,Wespi A.Toward a taxonomy of intrusion-detection systems[J].Comput Networks, 1999,31:805-822.
  • 4Helman P,Liepins G.Statistical foundations of audit trail analysis for the detection of computer misuse [J].IEEE Transactions on Software Engineering, 1993,19(9).
  • 5Javitz H S,Valdes A.The SRI IDES statistical intrusion detector[C]// Proc IEEE Symp Research in Security and Privacy,1990:316-326.
  • 6Simonian R P,Henning P R,Reed J H,et al.An AI approach toward computer virus detection and removal[C]//Harris Corporation, Government Information Systems Division,Melbourne,FL,1989.
  • 7Lu Hong-jun,Setiono R,Liu Huan.Effective data mining using neural networks[J].IEEE Transactions on Knowledge and Data Engineering, 1996,8(6).
  • 8Freitas A A.A genetic algorithm for generalized rule induction[C]// Roy R.Advances in Soft Computing-Engineering Design and Manufacturing.[S.l.] : Spinger-Verlag, 1999 : 340-353.
  • 9Wu Y T,An Y J,Geller J,et al.A data mining based genetic algorithm[C]//Proceedings of the Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and Second International Workshop on Collaborative Computing,Integration,and Assurance,2006.
  • 10Ou Min-wen,Chen Yu-bao,Orady E.Genetic algorithm and fuzzy C-means based multi-voting classification scheme in data mining[C]// Annual Meeting of the North American Fuzzy Information Processing Society,NAFIPS 2005,2005.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部