期刊文献+

基于危险信号协同检测的入侵检测的研究

Research of co-stimulate intrusion detection based on danger singal
下载PDF
导出
摘要 为提高对未知攻击的检测能力,克服由于"正常"与"异常"界线模糊引起的误报与漏报,提高入侵检测系统的自适应能力,基于danger theory提出以危险信号作为入侵检测的协同检测信号的方法,并运用粗糙集理论,实现了对危险信号的测定。同时,阐述了危险信号在入侵检测的协同检测中的控制策略及系统的逻辑结构和处理流程。 To increase the detection ability of unknown intrusion and overcome false negative rate and false positive rate when boundary between normal and abnormal was fuzzy and improve the adaptability of intrusion detection system, a co- stimulate intrusion detection with danger signal based on danger theory was presented. A method of determining the danger signals based on rough set theory was proposed and a control strategy of danger signal used in co-stimulate intrusion detection was brought forward. The logic structure of this system and the control flow of this system were proposed,.
出处 《计算机应用》 CSCD 北大核心 2008年第7期1784-1785,1806,共3页 journal of Computer Applications
关键词 危险信号 协同检测 入侵检测 免疫 danger signal co-stimulate intrusion detection immune
  • 相关文献

参考文献5

  • 1赵俊忠,黄厚宽,田盛丰.免疫机制在计算机网络入侵检测中的应用研究[J].计算机研究与发展,2003,40(9):1293-1299. 被引量:31
  • 2KIM J, BENTLEY P J. An evaluation of negative selection in an artificial immune system for network intrusion detection [ C]// Proceeding of the Genetic and Evolutionary Computation Conference. San Francisco, USA: ISGEC, 2001: 1330-1337.
  • 3FORREST S, HOFMEYR S A, SOMAYAJI A. Computer immunology[ J]. Communications of the ACM, 1997, 40(10) : 88 -96.
  • 4MATZINGER P. The danger model in its historical context [ J]. Scandinavian Journal of Immunology, 2001,54(1/2) : 4 -9.
  • 5徐慧,刘凤玉.多特征融合的入侵检测[J].计算机工程,2004,30(15):103-105. 被引量:10

二级参考文献43

  • 1[英]PM利迪亚德 A惠兰 M W范杰.林慰慈 薛彬 魏雪涛译.免疫学[M].北京:科学出版社,2001..
  • 2[1]Didaci L, Giacinto G, Roli F. Ensemble Learning for Intrusion Detection in Computer Networks. www.dii. ing.unist.it/aiia2002/paper/APAUT/Abstract/didact-aiia02.pdf, 2003-3-20
  • 3[2]Duda R, Hart P, Stork D G. Pattern Classification. John Wiley & Sons, 2001
  • 4[4]Stephen Northcutt, Mark Cooper, Matt Fearnow. lntrusion Signatures and Analysis[M]. 北京: 中国电力出版社, 2002-09
  • 5[7]Kittler J, Hatef M, Duin R P W,et al. An Combining Classifiers?. IEEE Trans, on Pattern Analysis and Machine Intelligence, 1998,20(3): 226
  • 6[8]Xu L., Krzyak A, Suen C Y. Mechods for Combining Multiple Classifiers and Their Applications to Handwriting Recognition[J]. IEEE Trans. Systems, Man and Cybernetics, 1992, 22:418-435
  • 7D' haesdeer. An immunological approach to change detection: Theoretical results. In: The 9th IEEE Computer Security Foundations Workshop. Los Alamitos, CA: IEEE Computer Society Press, 1996.
  • 8Dasgupta. An immune agent architecture for intrusion detection.GECCO 2000, Las Vegas, Nevada, USA, 2000.
  • 9Dasgupta. Immunity-based intrusion detection systems: A general framework. The 22nd National Information Systems Security Conf(NISSC), 1999. ftp://ftp, msci. memphis, edu/comp/dasgupta/papers/Immune-IDS, pdf.
  • 10Dasgupta, Gonzalez. An immunogenetic approach to intrusion detection. The University of Memphis, Tech Rep: CS-01-001,2001.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部