期刊文献+

基于云模型的入侵检测研究 被引量:1

Study of Intrusion Detection Based on Cloud Model
下载PDF
导出
摘要 由于网络行为的不确定性,使现有入侵检测系统几乎都存在高误报率和高漏报率的缺点。云模型是将模糊性和随机性有机结合进行不确定性推理的有效工具。本文利用云模型来处理网络实体行为的不确定性,提出了一种新的云入侵检测方法。该方法通过基于云知识库的云推理引擎进行不确定性推理,以对网络实体行为进行智能判断。模拟结果表明该方法能有效提高入侵检测效率。 Because of the uncertainty of network behavior,the exiting intrusion detection systems almost have some flaws,such as the high false positive rate and high false negative rate. Cloud model is an effective tool of uncertainty reasoning in transforming between qualitative concepts and their quantitative expressions combined with fuzziness and randomness. Based on cloud model,a new cloud intrusion detection method(CIDM) was presented in this paper. Cloud reasoning generator cloud intelligently processes network behavior by means of uncertainty reasoning based on cloud knowledge database. The simulation results indicate CIDM can greatly improve the effectiveness of intrusion detection.
出处 《微计算机信息》 2010年第3期102-103,共2页 Control & Automation
关键词 入侵检测 网络安全 不确定性推理 Intrusion detection Network security Uncertainty reasoning
  • 相关文献

参考文献4

  • 1MARTIN B,ROSSOUWS. Utilising fuzzy logic and trend analysis for effective intrusion detection [J].Computers and Secutity,2003,22 (5):432-434.
  • 2凌永发,王杰,陈跃斌.计算机入侵检测技术应用研究[J].微计算机信息,2006,22(03X):53-55. 被引量:18
  • 3吴晓庆,李众,刘艳.基于QoS的二维云模型控制器研究[J].微计算机信息,2007(06S):37-38. 被引量:2
  • 4LiDeyi, DiKaichang, LiDeren,et al. Mining associationrules with linguistic cloud models[C]. In: PAKDD'98, The Second Pacific Asia Conference on Knowledge Discovery & Data Mining, Melbourne, Australia, April. 1998.

二级参考文献9

  • 1冯友兵,张荣标,李华,陈相朝.网络控制系统时延分析现状[J].微计算机信息,2005,21(11S):19-21. 被引量:11
  • 2连洁,王杰.入侵检测系统在涉密计算机中的应用研究[J].微计算机信息,2005,21(10X):24-26. 被引量:8
  • 3Mukherjee B, heberlein L T, Levitt K N. Network intrusion detection[J]. IEEE Network, 1994, 13(2): 26-41.
  • 4Anderson J P. Computer security threat monitoring and surveillance[R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 5L.A.Zadeh,"Fuzzy Logic = Computing with Words".IEEE Trans.On Fuzzy Systems.Vol.4,no.2,May 1996,Pp:103-111.
  • 6D.Y.Li,H.J.Meng and X.M.Shi,"Knowledge representation and discovery based on linguistic atoms[C]." In:Proceedings of the 1st Pacific-Asia Conference on KDD&DM,Singapore,Feb.1997.pp:89-97.
  • 7李德毅,淦文燕,刘璐莹.人工智能与认知物理学[C].中国人工智能进展,第10届全国学术年会论文集,中国人工智能学会,北京邮电大学出版社.2003,Pp:6-15.
  • 8Li Deyi,Han J,Chan E,Shi Xuemei.Knowledge representation and discovery based on linguistic atoms[C].In:Proceedings of the 1st Pacific-Asia Conference on KDD&DM,Singapore,Feb.1997.Pp:89-97.
  • 9于之训,蒋平,陈辉堂,周刚.具有传输延迟的网络控制系统中状态观测器的设计[J].信息与控制,2000,29(2):125-130. 被引量:74

共引文献18

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部