期刊文献+

混合型入侵检测系统

Intrusion detection system of mixed
下载PDF
导出
摘要 为了提高检测效率并减小误报率,提出了一种基于免疫算法和诱捕技术的网络入侵检测模型。在诱捕服务器中提取记录进行格式转换,然后在否定选择算法中引入诱捕服务器的记录,以代替部分随机生成数据,即把误用检测和异常检测结合起来,将目前的独立配合模式改为相互联系的配合模式,充分利用各自独立的系统数据资源并使之共享,最后通过算法分析和模拟实验,证明了该系统具有较高的正确率和较低的误报率。 In order to improve the efficiency ofdetection and reduce the false positive rate, one kind ofintrusion detection model is pro- posed based on immunity algorithm and deception technology. The format ofthe records ofdeception server is changed at first, andthen the records of deception server in negative selection algorithm is used to replace of part of data which generated at random. In another word, it' s connection between misuse detection and anomaly detection. And present independent coordinate pattern is changed to a related pattern, each independent system data resources is used and shared. The result shows that this system has high detection rate and low false positive rate by the analysis of algorithms and experiment.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第19期4917-4919,4925,共4页 Computer Engineering and Design
基金 湖南省教育厅科研基金项目(06C115)
关键词 入侵检测 免疫原理 诱捕技术 非随机 否定选择 intrusion detection immune principle deception technology not at random negative selection
  • 相关文献

参考文献10

  • 1Zachary K Baker,Viktor K Prasanna.Auto_matic synthesis of efficient intrusion detection systems on FPGAs[J].Dependable and Secure Computing,2006,3(4):289-300.
  • 2Chaboya D J,Raines R A.Network intrusion detection: Automated and manual methods prone to attack and evasion[J].Security & Privacy Magazine,2006,4(6):36-43.
  • 3Sarasamma. Min-max hyperellipsoidal clustering for anomaly detection in network security[J]. Systems Man and Cybernetics, 2006,36(4):887-901.
  • 4http://www.ll.mit.edu/IST/ideval/data/data_index.html[OL].
  • 5Ames W I,Gouin J L.A system and method for enhanced psycho physiological detection of deception, assured client verificaition with remote processing[C]. Proceedings 40th Annual IEEE International on Carnahan Conferences Security Technology,2006: 303-309.
  • 6Stephan Riebach, Erwin P Rathgeb. Efficient deployment of honeynets for statistical and forensic analysis of attacks from the Internet[C].Information Security Practice and Experience,2005: 3439.
  • 7张玉芳,陈艳,吕佳,陈良,程平.免疫算法在入侵检测数据预处理中的应用[J].计算机工程与设计,2006,27(22):4387-4388. 被引量:2
  • 8周红刚,杨春德.基于免疫算法与支持向量机的异常检测方法[J].计算机应用,2006,26(9):2145-2147. 被引量:7
  • 9钱权,耿焕同,王煦法.基于SVM的入侵检测系统[J].计算机工程,2006,32(9):136-138. 被引量:14
  • 10汪洁,王建新,唐勇.分布式虚拟陷阱网络系统的设计与实现[J].计算机工程,2006,32(18):163-165. 被引量:4

二级参考文献26

  • 1范明 孟小峰.数据挖掘概念与技术[M].北京:机械工业出版社,2004..
  • 2Vapnik V.The Nature of Statistical Learning Theory[M].New York,Springer,1995.
  • 3Nguyen B V.An Application of Support Vector Machines to Anomaly Detection[Z].http://132.235.28.162/bnguyen/papers/IDS-SVM.pdf.
  • 4Friedman J.Another Approach to Polychotomous Classification[R].Department of Statistics of Stanford University.http://www-stat.stanford.edu/reports/friedman,1996-06.
  • 5Weston J,Watkins C.Multi-class Support Vector Machines[R].Royal Holloway,Department of Computer Science:University of London,1998-10.
  • 6KDD99.KDD99 Cup Dataset[Z].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,1999.
  • 7Levine J,LaBella R,Owen H,et al.The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks[EB/OL].http://www.tracking-hackers.com/papers/gatech-honeynet.pdf,2004-04-28.
  • 8Rahmat B,Azman S,Wee H C.Honeypot:Why We Need a Dynamics Honeypots[C].Proceedings of International Conference on Information and Communication Technologies:From Theory to Applications,2004:565-566.
  • 9Anderson P,Deception:A Healthy Part of Any Defense-in-Depth Strategy[EB/OL],http://www.sans.org/rr/whitepapers/policyis sues/506.php,2001.
  • 10Spitzner L.Honeypots:Tracking Hackers[M].Addison-Wesley,2002.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部