期刊文献+

入侵检测系统评测数据集发展分析 被引量:3

Research of Intrusion Detection System DARPA Dataset Evaluation
下载PDF
导出
摘要 入侵检测系统是网络安全的重要组成部分,入侵检测系统的评测分析能发现技术的不足及为研究提供改进的方向。文章对MIT林肯实验室的评测方法进行了详细的分析,并对基于该数据集的二次处理数据集进行了介绍。指出了MIT林肯实验室数据集的不足,作为进一步研究。 Intrusion detection system is an indispensable part of network security. IDS evaluation and testing may discover the weakness of current technology and thus improve on them. In this paper a detail analysis of evaluation and testing methodology is proposed by MIT Lincoln Lab, and the secondary process of dataset is introduced. Finally, we also are point out the weakness of MIT Lincoln Lab dataset and plan as our furthering research work.
出处 《计算机与数字工程》 2009年第4期108-111,121,共5页 Computer & Digital Engineering
关键词 数据集 入侵检测 IDS评测 dataset, intrusion detection, IDS evaluation and testing
  • 相关文献

参考文献11

  • 1Nicholas J Puketza et al. A Methodology for Tes ring Intrusion Detection System [J]. IEEE Trans on Soft ware Engineering, 1996,(10) :720-728
  • 2H. Debar et ai. A. Wespi and S. Lampart. An Experimentation Workbench for Intrusion Detection Systems [R]. Switzerland : IBM Research Division, Tech Rep : RZ2998,1998
  • 3Lippmann R. P., Haines J. W. et al. The 1999 DARPA off line Intrusion Detection Evaluation[J]. Computer Networks, 2000, (2):579-595
  • 4史美林,钱俊,许超.入侵检测系统数据集评测研究[J].计算机科学,2006,33(8):1-8. 被引量:24
  • 5Terrence G. Champion Robert S. Durst Air Force Intrusion Detection System Evaluation Environment [R]. Air Force Research Laboratory, 1999
  • 6汪洋,龚俭.入侵检测系统评估方法综述[J].计算机工程与应用,2003,39(32):171-173. 被引量:10
  • 7Kristopher K. A Database of Computer Attacks for the Evaluation of Intrusion Detection System [D]. Massa chusetts Institute of Technology, 1999
  • 8Lee M. Rossey, Robert K. Cunningham, et al. LARIAT:Lincoln Adaptable Real time Information Assurance Testbed[C]. IEEE Proc. Aerospace Conf. 2002
  • 9LEE W. A Data mining framework for constructing feature and model for intrusion detection system[D]. Columbia university, 1999
  • 10LEEW. STOLFO SJ, MOK K W. A data mining framework for building intrusion detection models [C]. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999,5

二级参考文献56

  • 1杨德刚.基于模糊C均值聚类的网络入侵检测算法[J].计算机科学,2005,32(1):86-87. 被引量:26
  • 2[1]Vapnik V N. The Nature of Statistical Learning Theory [M]. New York: Springer, 1995.
  • 3[2]Scambray J, McClure S, Kurtz G. Hacking Exposed: Network Secrets Solutions (Second Edition) [M]. Mc Graw Hill, 2000.
  • 4[3]Burges C J C. A turorial on support vector machines for pattern recognition [J]. Data Mining and Knowledge Discovery, 1998, 2(2):121~167.
  • 5[4]Schlkopf B, et al. Estimating the Support of a High-Dimensional Distribution [R]. Haifa: Department of Computer Science, University of Haifa, 2001.
  • 6[5]Lee W K, Stolfo S J, Moka K W. Adaptive Intrusion Detection: A Data Mining Approach[J]. Artificial Intelligence Review, 2000,14(6):533~567.
  • 7[6]Chen Y, Zhou X, Huang T S. One-class SVM for learning in image retrieval [A]. Proceeding IEEE Int'1 Conference on Image Processing [C]. 2001,vol.1.34~37.
  • 8[7]http://www.ll.mit.edu/IST/ideval/data/1999/.
  • 9[8]http://kdd.ics.uci.edu/databases/kddcup99.
  • 10[9]Li K L, Huang H K, Tian S F. A novel multi-class SVM classifier based on DDAG [A]. IEEE ICMLC'02 [C]. Beijing: 2002, vol.3. 1203~1207.

共引文献39

同被引文献22

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部