期刊文献+

基于序列比对算法的伪装入侵检测技术

Masquerading Intrusion Detection Technique Based on Sequence Alignment Algorithm
下载PDF
导出
摘要 序列比对是生物信息学中基本的信息处理方法,对于发现生物序列中的功能、结构和进化信息具有重要的意义。该文对典型的序列比对算法N-W算法和S-W算法进行了分析对比,将S-W算法应用到伪装入侵检测中,通过实验验证了该算法的高灵敏度入侵检测性能。 Sequence alignment is a basic information processing method in bioinformatics and useful for discovering functional, structural, and evolutionary information in biological sequence. Typical sequence alignment algorithms of N-W and S-W are described and analyzed in this paper. S-W algorithm is introduced into masquerading intrusion detection and the experiment substantiates the high-sensitive detection performance of the algorithm.
机构地区 中国人民解放军
出处 《计算机工程》 CAS CSCD 北大核心 2007年第24期177-180,共4页 Computer Engineering
关键词 序列比对 入侵检测 伪装 S-M算法 sequence alignment intrusion detection masquerade S-W algorithm
  • 相关文献

参考文献9

  • 1Kendall K.A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems[D].Cambridge,MA:Massachusetts Institute of Technology,1999.
  • 2Needleman S B,Wunsch C D.A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins[J].Journal of Molecular Biology,1970,48(3):443-453.
  • 3Smith T F,Waterman M S.Identification of Common Molecular Subsequences[J].Journal of Molecular Biology,1981,147(1):195-197.
  • 4Lippmam D J,Pearson W R.Rapid and Sensitive Protein Similarity Searches[J].Science,1985,227(4693):1435-1441.
  • 5Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:Eluding Network Intrusion Detection[R].Secure Networks Inc.,1998.
  • 6Lippmann R,Cunningham R K,Fried D J,et al.Results of the DARPA 1998 Offline Intrusion Detection Evaluation[C]//Proc.of the 2nd International Workshop on RAID.USA:[s.n.],1999.
  • 7汪冬,唐志敏.Smith-Waterman算法在脉动阵列上的实现及分析[J].计算机学报,2004,27(1):12-20. 被引量:6
  • 8Schonlau M.Masquerading User Data[EB/OL].(2003-09-19).http:// www.schonlau.net.
  • 9Schonlau M,DuMouchel W,Ju W,et al.Computer Intrusion:Detecting Masquerades[J].Statistical Science,2001,16(1):58-74.

二级参考文献12

  • 1Bogulski M.. Bioinformatics--A new area. Immunology To day (now Trends in Immunology), 1998, 19(11)
  • 2Needleman S. B. , Wunsch C. D.. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 1970,48: 443 ~ 453
  • 3Smith T. F. , Waterman M. S.. Identification of common molecular subsequences. Journal of Molecular Biology, 1981, 147(1): 195~197
  • 4Waterman M. S.. Introduction to Computational Biology.Chapman & Hall, 1995
  • 5Wallin E.. Optimized sequence matching on the CM-2[Master dissertation]. Center for Parallel Computers, Royal Institute of Technology, Stockholm, Sweden, 1992
  • 6Yap T. K. , Frieder O. , Martino R L.. Parallel computation in biological sequence analysis. IEEE Transactions on Parallel and Distributed Systems, 1998, 9(3): 283~294
  • 7Hughey R.. Programmable systolic arrays [ Ph. D. dissertation].Brown University, Providence RI, USA, 1991
  • 8Lopresti D. P. , Hughey R.. The B-SYS programmable systol ic array. Brown University, Providence RI, USA: Technical Report CS-89-32, 1989
  • 9Hughey R. , Lopresti D. P.. B-SYS: A 470-processor programmable systolic array. In: Proceedings of International Conference on Parallel Processing, Austin, Texas, 1991, 580~583
  • 10Dahle D. M. et al.. Kestrel: Design of an 8-bit simd parallel processor. In: Proceedings of the 17th IEEE Conference on Advanced Research in VLSI,Chicago,Illinois, 1997,145~162

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部