期刊文献+

一种模糊神经网络检测下的入侵容忍系统设计 被引量:1

Design of Intrusion Tolerant System Based on Flurry Neural Network
下载PDF
导出
摘要 为了与网络系统中的入侵行为进行抗衡,可以通过安装入侵检测系统来监控系统中的各种网络行为,入侵容忍可以作为入侵检测系统的互补系统与之一起工作。漏报与误报问题是入侵检测系统面临的根本性问题,加入神经网络技术后并不能完全解决此问题。入侵容忍技术的提出很好地平衡了"失误"与"恶意"、"入侵"与"非有意"之间的冲突与矛盾。入侵容忍本身就是一种"模糊"概念,为模糊数学在计算机安全中的应用提供了有力的理论支持。提出了一种基于模糊神经网络的入侵检测系统应用于入侵容忍的设计方案,并将入侵容忍与入侵检测、防火墙结合,作为一个独立于应用的系统进行设计。 In order to confront the invading behavior of the net system,the invading detection system could be set up to inspect and control the various net perform. The invading abide could work with the invading detection system as a compensatory system. Fail to report and misreport a problem is ultimacy problem facing the intrusion detect system, can not resolve this problem completely after adding the nerve network technology. Intrusion tolerant technology suggesting that has balanced conflict and contradiction between the "fault" and "evil intention"," has invaded" and "must have a mind to". Intrusion tolerant technology is one kind of "flurry" concept,be that the fuzzy mathematics has provided forceful theory support in application in computer safety. This article brought forward a design project ,which is one kind of the invading detecting application based on flurry neural network,and combined the invading abide and the invading detection with the firewall ,which designed as a system isolated from the application.
作者 贾学明 王娟
出处 《航空计算技术》 2008年第1期130-134,共5页 Aeronautical Computing Technique
基金 云南省教育厅青年基金项目(6Y0003d)
关键词 模糊神经网络 入侵检测 入侵容忍 flurry neural network invading detection invading abide
  • 相关文献

参考文献5

二级参考文献11

  • 1BaceRG.Intrusion Detection[M].北京:人民邮电出版社,2001.56-72.
  • 2刘有才,模糊专家系统原理与设计,1995年
  • 3刘春林,东南大学学报,29卷,1期
  • 4Bruno Dutertre,Valentin Crettaz,Victoria Stavridou.Intrusion-Tolerant Enclaves[C].In:IEEE Conference on Security and Privacy,Oakland, CA, 2002-05.
  • 5Paulo Esteves Verissimo, Nuno Ferreira Neves, Miguel Pupo Correia. Intrusion-Tolerant Architectures : Concepts and Design.http ://www. navigators.di.fc.ul.pt.
  • 6Thomas Wu ,Michael Malkin,Dan Boneh.Building Intrusion Tolerant Applications.http ://www.stanford.edu/-dabo/ITrC.
  • 7Sushil ,Jajodia Peng,Liu Paul Ammann.A Fault Tolerance Approach to Survivability.Center for Secure Information Systems,Mail Stop 4A4 George Mason University,Fairfax,VA 22030--A.A.A.A.
  • 8刘春林,何建敏.神经网络用于模式识别分类的改进算法[J].东南大学学报(自然科学版),1999,29(1):20-24. 被引量:6
  • 9李之棠,杨红云.模糊入侵检测模型[J].计算机工程与科学,2000,22(2):49-53. 被引量:50
  • 10荆继武,周天阳.Internet上的入侵容忍服务技术[J].中国科学院研究生院学报,2001,18(2):119-123. 被引量:25

共引文献18

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部