期刊文献+

一种基于本体映射的网络自适应入侵检测系统

A network adaptive intrusion detection system model based on ontology mapping
下载PDF
导出
摘要 针对入侵检测系统中数据噪音干扰、响应速度难以与网络速度的增长保持同步、入侵模式不断变化和判别知识库不完备等问题,提出了一种基于本体映射的网络自适应入侵检测系统模型.在该模型中,数据信息和知识元经过训练形成本体知识库,同时对可预测和已知的特征数据进行挖掘,形成特征库;对于待测数据集进行本体训练,对其本体和本体知识库进行映射,相似度低于系统安全阈值的数据集参考特征库进行特征分析,若属于用户误用操作,给予建议,否则,属于异常数据,予以报警;每次检测结束,对本体库和特征库进行实时更新.该模型通过本体映射模糊判断和特征库具体分析相结合的方式,有效的提高了检测效率和预警率. according to the intrusion detection system,data noise interference with the response speed to keep pace with the growth of network intrusion model,knowledge changes and imperfect problem,this paper proposes a method based on ontology mapping network adaptive intrusion detection system model.In this model,data information and chunk trained to form ontology knowledge base,predictable and known characteristics,forming characteristics of data mining,To test data set,the ontology training on ontology and ontology mapping,similarity knowledge than system safety data collection reference library characteristic analysis,the characteristics of operation,if misused,otherwise,belong to suggest to alarm;abnormal data,Each test,to end an ontology and real-time update feature library.The model of fuzzy judgment by ontology mapping and feature library concretely analyzed combining,effectively improve the efficiency and warning.
作者 乜国雷
机构地区 青海民族大学
出处 《湖南农业大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第S1期90-92,共3页 Journal of Hunan Agricultural University(Natural Sciences)
关键词 入侵检测 本体 相似度 特征分析 invasion detection ontology similarity characteristic analysis
  • 相关文献

参考文献5

二级参考文献43

  • 1蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29
  • 2陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 3Sherif J S.Intrusion detection:the art and the praetice[J].Information Management and Computer Security, 2003,11 (5) : 175-186.
  • 4Sodiya A S,Longe H O D,Akinwale A T.A new two-tiered strategy to intrusion detection[J].Information Management and Computer Security, 2004,12( 1 ) :27-44.
  • 5Sherif J S,Ayers R.Intrusion detection:methods and systems.Part Ⅱ[J]. Information Management and Computer Security, 2003,11 (5) : 222- 229.
  • 6Jiang WangBao,Song Hua.Real time intrusion detection for highspeed networks[J].Computer&Security, 2005,24: 287-294.
  • 7郑东栋,胡伟,瞿裕忠.一种关系数据库模式和本体问的匹配方法[c].计算机科学技术进展--第二届江苏计算机大会论文集,2006-11.209-213.
  • 8LIN Dekang. An Information - theoretic definition of similarity [C]. Proceedings of the 15th International Conference on Machine Learning. 1998.
  • 9TANG Jie, et al. Using Bayesian decision for ontology mapping [ C ]. Web Semantics : Science, Services and Agents on the World Wide Web, Dec. 2006. 243- 262.
  • 10Sergy Melnik, Hector Garcia - Molina and Erhard Rahm. Similarity flooding: A versatile graph matching algorithm and its application to schema matching[ C]. Proceeding of the 18th International Conference on Data Engineering. 2002.117 -128.

共引文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部