期刊文献+

基于免疫和模糊综合评判的入侵检测模型研究 被引量:2

Study on intrusion detection model based on immune and fuzzy judgment
下载PDF
导出
摘要 应用人体免疫系统的特异性免疫的分类,设计了一个入侵检测模型,将入侵检测模块分为固有检测模块和适应性检测模块。固有检测模块考虑继承目前已有的知识;适应性检测模块针对目前异常检测算法难以确定评判正常和异常的阈值以及检测特征数量多难以综合评判的问题,提出了一种具体的异常检测算法——FLADA。该算法借鉴了模糊数学的理论,采用模糊综合评判和层次分析法相结合。实验证明,该方法不仅能准确地检测出已知攻击,还能较好地检测出未知攻击。 Based on the classification of specific immunity in human immune system, a model of intrusion detection was designed, The intrusion detection module was classified to the innate detection module and the adaptive detection module in this model. The innate detection module inherits available rides. To solve the problem such as difficulty to certain the threshold of normal and anomaly and difficulty to judge synthetically for multiple data in anomaly detection, the adaptive detection module presented an algorithm of anomaly detection: Fuzzy and Level-based Anomaly Detection Algorithm (FLADA), which has benefited from fuzzy mathematics and integrates fuzzy judgment with hierarchical analysis, Experiments show that the method can detect not only defined intrusion fast, but also undefined intrusion fairly.
出处 《计算机应用》 CSCD 北大核心 2007年第9期2163-2166,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60363002) 国家973计划项目(2007CB316505 2006CB303000) 科技型中小企业技术创新基金资助项目(07C26213600564)
关键词 入侵检测 免疫 模糊综合评判 层次分析法 intrusion detection immune fuzzy judgment hierarchical analysis
  • 相关文献

参考文献8

  • 1FORREST S,PERELSON A,ALLEN L.Self-noself discrimination in a computer[C]// Proceedings of the 1994 IEEE Symposium on Research in Security and Priracy.[S.l.]:IEEE Press,1994.
  • 2KIM J,BENTLEY J P.An evaluation of negative selection in an artificial immune system for network intrusion detection[C]// Proceedings of the Genetic and Evolutionary Computation Conference 2001.San Francisco:[s.n.],2001:1330-1337.
  • 3HOFMEYR S A,FORREST S.Immunity by design:an artificial immune system[EB/OL].[2007-02-10].http://www.cs.unm.edu/~immsec/publications/gecco-steve.pdf.
  • 4KIM J,BENTLEY J P.An artificial immune model for network intrusion detection[C]// 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT'99).Aachen:[s.n.],1999.
  • 5LEE W,STOLFL J S.Data mining approaches for intrusion detection[EB/OL].[2007-02-10].http://www.usenix.org/publications/library/proceedings/sec98/full_papers/lee/lee.pdf.
  • 6LANE T,BRODLEY E C.An application of machine learning to anomaly detection[C]// Proceeding of the 20th National Conference on National Information Systems Security.[S.l.]:Baltimore,1997:366-380.
  • 7张吉军.模糊层次分析法(FAHP)[J].模糊系统与数学,2000,14(2):80-88. 被引量:1553
  • 8DARPA dataset[EB/OL].[2007-02-01].http://www.ll.mit.edu/IST/ideval/data/1999/1999_data_index.html.

二级参考文献3

  • 1姚敏,系统工程,1997年,15卷,2期
  • 2张跃,模糊数学方法及其应用,1992年
  • 3许树柏,层次分析法原理,1988年

共引文献1552

同被引文献25

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部