期刊文献+

基于转移和频率特征的协议异常检测 被引量:2

Protocol Anomaly Detection Based on Transition and Frequency of Attribute
下载PDF
导出
摘要 协议异常检测是目前入侵检测领域研究的新方向.本文研究状态的转移特性和频率特性,在此基础上建立模型进行协议异常检测.模型的训练和检测使用DARPA 1999年的数据集,实验结果验证了所建立模型的准确性. A protocol anomaly detection is the new research topic in current intrusion detection field. The transition and frequency properties were studied in this paper. The protocol anomaly detection was then set up. The model's correctness and effectiveness is demonstrated by experiments used MIT Lincoln Laboratory 1999 DARPA Intrusion Detection Evaluation Data Set.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2009年第5期104-108,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金资助项目(60442002) 北京交通大学科技基金项目资助(2006XM007)
关键词 入侵检测 异常检测 协议异常检测 隐马尔科夫模型 支持向量机 intrusion detection anomaly detection protocol anomaly detection hidden markov model (HM M) support vector machine(SVM)
  • 相关文献

参考文献17

  • 1Balasubramaniyan J S, Garcia Fernandez J O, Isacoff D, et al. An Architecture for Intrusion Detection Using Autonomous Agents[ C]//The 14th Annual Computer Security Applications Conference. Phoenix, AZ: IEEE Computer Society, 1998:13 - 24.
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3Das Kumar. Protocol Anomaly Detection for Network- Based Intrusion Detection [ R ]. GSEC Practical Assignment Version 1.2f, 2001.
  • 4Lemonnier E. Protocol Anomaly Detection in Network- Based IDSs[R]. Stockholm: Defcom, 2001.
  • 5Beetle Sasha. A Strict Anomaly Detection Model for IDS [EB/OL]. Phrack, (2000) [2008-10-23]. http:////www. phrack.com/issues. html? issue = 56 &id = 11.
  • 6Yoo I S. Protocol Anomaly Detection and Verification[ C] //Proc of the 2004 IEEE 5th Annual IEEE Workshop on Assurenee and Security. INSTICC Press, 2004: 299- 304.
  • 7Abdullah I S, Menasce D A. Protocol Specification and Automatic Implantation Using XML and CBSE[C]//Proc of International Conference on Communications, Internet and Information Technology. Calgary, AB: ACTA Press, 2003:17 - 19.
  • 8高磊,张德运,Md Jahangir Alam,张军,胡国栋.基于Petri网的TCP协议异常检测模型[J].西安交通大学学报,2006,40(6):659-662. 被引量:4
  • 9Estevez Tapiador J M, Garcia Teodoro P, Diaz Verdejo J E. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection [ C ] //Proc of IEEE IWIA' 03. Piscataway, NJ: IEEE, 2003: 3-12.
  • 10李娜,秦拯,张大方,陈蜀宇.基于Markov Chain的协议异常检测模型[J].计算机科学,2004,31(10):66-68. 被引量:6

二级参考文献31

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2Stephanie Forrest, Steven, A. Hofmeyr, Anti Somayaji. A Seace of Self for Unix Processes[A] .IEEE Symposium on Security and Privacy[C].Oakland, California IEEE Computer Society, 1996. 120 - 128.
  • 3Christina Warrender, Stephanie Forrest, Barak Pearlmutt. Detecting Intrusions Using System Calls: Alternative Data Model[ A]. 1999 IEEE Symposium on Security and Privacy[C]. 1999.133 - 145.
  • 4R Dugad, U B Desai. A Tutorial on Hidden Markov Models [ OL] url.http://vision. ai. uiuc. edu/dugad/guestbook/addHMMguest, html.
  • 5Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras. State transition analysis: a rule-based intrusion detection approach[J]. IEEE Trans. on Software Engineering, March 1995,21 (3) : 181 - 199.
  • 6Teresa F lunt,R Jagannnthan, Menlo Park. A Prototype Real-Time Intrusion-Detection Expert System[A]. 1988 IEEE Symposium on Security and Privacy[C]. 1988.59 - 65.
  • 7Yanqiao. Xie Weixin. Yangbin Songge. An anomaly intrusion detection method based on HMM[J]. Eletronics Leeters,2002, 38(13) :663 -664.
  • 8Wenke Lee Dong Xiong. Information-Theoretic Measures for Anomaly Detection[A]. Proceedings IEEE Symposium on Security and Privacy[ C]. IEEE Computer Society, Oakland, California, USA. May 14 - 16,2001.
  • 9Estevez-Tapiador J M, et al. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. In:Proc. of the First IEEE Intl. Workshop on Information Assurance(IWIA'2003)
  • 10Warrender C, Forrest S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, 1999

共引文献127

同被引文献12

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部