期刊文献+

入侵检测系统中两种异常检测方法分析 被引量:6

原文传递
导出
摘要 随着互联网的广泛应用,网络信息量迅速增长,网络安全问题日趋突出。入侵检测作为网络安全的重要组成部分,已成为目前研究的热点,特别是针对异常入侵检测方法的研究。本文着重分析了基于神经网络的和层次聚类的异常检测方法,并从理论和实验层次对两种检测技术进行分析比较,客观分析了两种算法的优缺点。
出处 《网络安全技术与应用》 2009年第1期33-35,共3页 Network Security Technology & Application
  • 相关文献

参考文献3

二级参考文献35

  • 1张连华,张冠华,郁郎,张洁,白英彩.Intrusion detection using rough set classification[J].Journal of Zhejiang University Science,2004,5(9):1076-1086. 被引量:16
  • 2Heady, George.The Architecture of a Network Level Intrusion Detection System[R].Technical Report CS90-20, Department of Computer Science,University of New Mexico,1990.
  • 3Mukherjee,Heberlein.Network Intrusion Detection[J].IEEE Network, 1994;8(3) :26-41.
  • 4Kumar,Spafford.A Pattern Matching Model for Misuse Intrusion Detection[C].In:Proc of the 17th National Computer Security Conference, 1994:11-21.
  • 5Nuansri.A Process State-Transition Analysis and Its Application to Intrusion Detection[C].In:Proc of the 15th Annual Computer Security Application Conference, 1999.
  • 6Sinclair.An Application of Machine Learning to Network Intrusion Detection[C].In:Proceedings of the 15th Annum Computer Security Applications Conference, 1999.
  • 7Maloof.Selecting Examples for Partial Memory Learning[J].Machine Learning, 2000 ;41 ( 1 ) :27-52.
  • 8Nasraoui ,Gonzalez.A Scalable Artificial Immune System Model for Dynamic Unsupervised Learning[C].In:Proc of GECCO'03 ,Chicago, USA, 2003 : 219-230.
  • 9Agarwal ,Joshi.PNrule:A New Framework for Learning Classifier Models in Data Mining(A Case-Study in Network Intrusion Detection)[C].In:Proc of the lth SIAM Int Conf on Data Mining,2001.
  • 10Nasaroui,Dasgupta.A Novel Artificial Immune System Approach to Robust Data Miming[C].In:Proc of GECCOO2,New York,2002:356-363.

共引文献36

同被引文献19

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部