期刊文献+

基于模糊评判法的入侵检测模型研究 被引量:2

The Research of Anomaly Detection Method
下载PDF
导出
摘要 介绍了入侵检测和模糊数学的基础知识,在此基础上建立了基于模糊评判法的入侵检测算法模型,并通过具体实例进行了验证,初步实现了该算法,由此证明了基于模糊理论的入侵检测模型比以往的异常检测模型具有更高的实时性和可靠性。 Introduced the invasion examination and the fuzzy mathematics elementary knowledge, has established in this foundation based on the fuzzy judgment method invasion examination algorithm model, and has carried on the confirmation through the concrete example, initially has realized this algorithm, from this had proven has a higher timeliness and the reliability based on the fuzzy theory invasion examination model compared to the former exceptionally examination model.
出处 《微计算机信息》 北大核心 2008年第15期88-89,92,共3页 Control & Automation
基金 国家自然科学基金名称:基于可复用标准构件的业务过程建模(70471037) 陕西省自然科学基金名称:电子商务商业建模(2004G02)
关键词 模糊评判法 入侵检测 异常检测 专家评判法 fuzzy judgment invasion examination anomaly detection linguistic variable
  • 相关文献

参考文献4

  • 1蒋建春,冯登国.网络入侵检测原理与技术[M].国防工业出版社,2006.
  • 2BISWANATH M,TODD L,KARL N.Network intrusion detection [J].IEEE Network,1994,8-3:26-41.
  • 3杨雪涛,顾利忠,罗予频.一种基于约束特征的网格编辑技术[J].微计算机信息,2006,22(11S):233-236. 被引量:2
  • 4Bai Y,Kobayashi H.Advanced Information Detection Systems[M]. technology and development,2003.

二级参考文献8

  • 1赵启升.基于OpenGL三维物体建模方法的研究与实现[J].微计算机信息,2005,21(12X):149-151. 被引量:16
  • 2Barr A H.Global and Local Deformation of Solid Primitives.Computer Graphics 1984,18(3):21-30.
  • 3Sederberg T W Parry S R.Free-form Deformation of Solid Geometric Models[J].Computer Graphics,1996,30(4):537-541.
  • 4Coquillart S.Extended free-form deformation:a sculpturing tool for 3D geometric modeling.Computer Graphics,1990,24(4):18 7-193.
  • 5Hsu W,Hughes J.Direct manipulations of Free form deformations.Computer Graphics,1992,26(2):177-184.
  • 6Borrel P,Rappoport A.Simple constrained deformations for geometric modeling and interactive design.ACM Transactions on Graphics,1994,13(2):137-155.
  • 7Eck M,DeRose T.Multiresolution analysis of arbitrary meshes.In SIGGRAPH' 95,1996:173-182
  • 8Sorkine O,Cohen-OR D.Laplacian surface editing[C].In:proceedings of Eurographics Symposium on Geometry Processing,2004:179-188.

共引文献2

同被引文献13

  • 1孙昌儿,刘秉瀚.基于粗糙集理论的病理诊断规则提取算法研究[J].福州大学学报(自然科学版),2007,35(2):175-179. 被引量:3
  • 2曹晖,王青青,马义忠,罗平.基于动态贝叶斯博弈的攻击预测模型[J].计算机应用,2007,27(6):1545-1547. 被引量:13
  • 3KurganLA, CiosKJ. CAIM discretization algorithm [J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16 (2): 145 -153.
  • 4ChingJY, WongAKC, ChanKCC. Class-dependent discretization for inductive learning from continuous and mixedmode data [J]. IEEE Trans Pattern Analysis and Machine Intelligence, 1995, 17 (7): 641-651.
  • 5Alpcan T,Bapr T.A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection[C]//Decision and Control, 2003 .Proceedings. 42 nd IEEE Conference on.
  • 6Agah,Das A,Basu S K,Asadi K.Intrusion detection in sensor networks:a non-cooperative game approach [ C ]//Network Computing and Applications, 2004.( NCA 2004 ). Third IEEE International Symposium on.
  • 7Patcha A, Park J M, A game theoretic formulation for intrusion detection in mobile ad hoc networks [ J ]. International Journal of Network Security, 2006, 2(2): 146-152.
  • 8Kachirski O,Guha R. Intrusion detection using mobile agents in wire-less Ad Hoc networks [C] // Proceedings of IEEE Workshop on Knowledge Media Networking,2002.
  • 9Balinski M L,CottleR W.Complementarity and Fixed Point Problems[M].North--Holland PublishingCompany: 1978.
  • 10Ahuja R, Bagrodia R, Gerla M. GloMoSim: A Scalable Simulation Environment for Wireless and Wired Network Systems [EB/OL].April,2004.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部