期刊文献+

基于模糊推理信息融合的Ad Hoc入侵检测 被引量:1

Ad Hoc Intrusion Detection Based on Fuzzy Reasoning Information Fusion
下载PDF
导出
摘要 在分析入侵检测系统和模糊技术的基础上,研究一种基于模糊推理信息融合的Ad Hoc入侵检测系统模型,将模糊系统较高的准确性、明确的针对性、较好的适应性运用于入侵检测系统,克服目前入侵检测系统存在的效率低、灵活性和升级能力有限等缺陷,提高整个系统的安全性和可用性。该文在分析模糊入侵检测系统的基础上对不同簇首信息进行融合,通过模糊技术作出最终的决策,通过融合中心进行入侵状态估计、态势估计、威胁估计。 Based on IDS and fuzzy technology, this paper studies intrusion detection system base on fuzzy reasoning information fusion. The model is good at promoting veracity and flexible in IDS. It overtakes some limitation, such as low efficiency, low flexibility, and uneasy to upgrade. This paper studies that fusion center fuses data of all different cluster head of Ad Hoc, and uses fuzzy technology to deduce decision-making. Decision-making of fusion center makes safety evaluation——status of IDS evaluation, situation IDS evaluation, threaten evaluation.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第14期146-148,共3页 Computer Engineering
基金 国家"973"计划基金资助项目(2006CB303006) 国家自然科学基金资助项目(60363002) 江西省分布计算工程技术研究中心开放基金资助项目
关键词 信息融合 入侵检测 安全评估 information fusion intrusion detection safety evaluation
  • 相关文献

参考文献6

二级参考文献65

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2l Chlamtac, M Conti, et al. Mobile Ad hoc Networking: Imperatives and Challenges[J]. Ad hoc Net works, 2003,1(1) :13-64.
  • 3Luis F G Sarmenta. Sabotage-tolerance Mechanism for Volunteer Computing Systems [ J ]. Future Generation Computer Systems, 2002,18(4) :561-572.
  • 4C Perkins. Highly Dynamic Destination-Sequenced Distance-Vector routing ( DSDV ) for Mobile Computers [ C ]. Proceedings of SIGCOMM, 1994.
  • 5S Murthy, et al. An Efficient Routing Protocol for Wireless Networks[ J ]. Mobile Networks and Applications, 1996,1 ( 2 ) : 183-197.
  • 6C E Perkins, E M Royer. Ad hoc On-demand Distance Vector Routing[J]. IEEE Workshop on Mobile Computing Systems and Applications, 1999,(2) :90-100.
  • 7D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[ C]. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1994, ( 12 ) : 158-163.
  • 8K Sanzgiri, B Dahill, et al. A Secure Routing Protocol for Ad hoc Networks [ C ]. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002. 1-10.
  • 9Hongmei Deng,et al. Routing Security in Wireless Ad hoc Networks[J]. IEEE Communications Magazine,2002, (10) :70-75.
  • 10C1 Karlof, D Wager. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [ J ]. Ad hoe Networks, 2003, ( 1 ) :293-315.

共引文献75

同被引文献12

  • 1杨辉华,王行愚,王勇,何倩.基于KPLS的网络入侵特征抽取及检测方法[J].控制与决策,2005,20(3):251-256. 被引量:14
  • 2蒋卫华,种亮,杜君.入侵检测中的审计追踪技术[J].计算机工程,2006,32(18):169-171. 被引量:7
  • 3姚羽,高福祥,邓庆绪,于戈,张守智.混合前馈型神经网络在入侵检测中的应用研究[J].控制与决策,2007,22(4):432-435. 被引量:1
  • 4Botha Martin, Von Solms Rossouw. Utilizing fuzzy logic and trend analysis for effective intrusion detection [J]. Computers and Security, 2003,22(5); 423-434.
  • 5Wang Y, Yang H H, Wang X Y, et al. Distrbuted intrusion detection system based on data fusion method [C]. The 5th World Congress on Intelligent Control and Automation. New Jersey: IEEE Press, 2004: 4331- 4334.
  • 6Dasgupta D, Gonzalez F. An immunity-based technique to characterize intrusoions in computer networks [J]. IEEE Trans on Evolutionary Computation, 2002, 6(3) : 281-291.
  • 7Tax D M J, Duin R P W. Data domain description using support vectors[C]. Proc of the European Symposium on Artificial Neural Networks. Brussels: Verleysen, 1999: 251-256.
  • 8Tax D M J, Duin R P W. Support vector domain description[J]. Pattern Recognition Letters, 1999,20 (11-13) : 1191-1199.
  • 9Vapnik V. The nature of statistical learning theory [M]. 2nd ed. New York: Springer-Verlag, 2000.
  • 10GonzalezF, Dasguta D. Combinng negative selection and classification techniques for anomaly detection[C]. Proc of the 2002 Congress on Evolutionary Computation. Washington DC, 2002, 6(3): 705-710.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部