期刊文献+

基于决策树的协同网络入侵检测 被引量:5

The Cooperative Network Intrusion Detection Based on Decision Tree
下载PDF
导出
摘要 由于不同网络协议有不同的属性值,不同的数据集可被用来检测网络入侵.该文提出了一种基于决策树的协同网络入侵检测模型,该模型是由多个代理组成,每个代理针对不同的网络数据协议类型(TCP/UDP/ICMP)分别履行检测,且它们又通过协同构成一个整体检测体系.最后用KDD CUP 99数据进行实验,验证了该方法检测入侵行为的有效性. Because different network protocols have different attributes,different data could be used to detect network intrusion.A cooperative network intrusion detection model based on decision tree is be proposed.This model is coposed of multi-agents,each agent is constructed for different protocol which is used to detect the network and they construct a detection architecture by cooperation.At last the data sets of KDD CUP99 are used as the experiment data,and the results show the efficiency of our method.
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2010年第3期302-307,共6页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 广东省自然科学基金(06021484 9151009001000007 9451009001002777) 广东省科技计划(2008A060201011)资助项目
关键词 决策树 协同 网络入侵检测 协议类型 decision tree cooperative network intrusion detection protocol type
  • 相关文献

参考文献11

二级参考文献48

  • 1张巍.基于数据挖掘技术的智能化入侵检测模型[J].计算机工程,2005,31(8):134-136. 被引量:2
  • 2张正球,章志明,余敏.基于迁移计划图的Agent迁移机制[J].计算机工程,2005,31(16):222-224. 被引量:4
  • 3LI Tao.An immune based dynamic intrusion detection model[J].Chinese Science Bulletin,2005,50(22):2650-2657. 被引量:17
  • 4杨学兵,张俊.决策树算法及其核心技术[J].计算机技术与发展,2007,17(1):43-45. 被引量:84
  • 5Anderson J P. Detecting unusual program behavior using .the statistical components of NIDES[ EB/OL]. [ 2008-06-17 ]. http://www. sdl. sri. com/papers/5sri/5sri.pdf, 1995.
  • 6Debar H, Beck M, Sibonid. A neural network component for an intrusion detection system [ C ]. Oakland: ACM, 1992: 240-251.
  • 7Taylor C, FoSS J A. NATE: network analysis of anomalous traiffic events, a low-cost approach[ C ]. Clounderoft: IEEE, 2002.
  • 8Esponda F, Forrest S, Helman P. A formal frame work for positive and negative detection schemes[ J ]. IEEE Transactions on Systems Man and Cybernetics Part B-cybernetics, 2004,34( 1 ) : 357-373.
  • 9Kim J, Bentley P J. Towards anartificial immune system for network instrusion dtection: an investigation of dynamic clonal selection[ C]. New York: IEEE,2002:1015-1020.
  • 10Hofmeyy S A. An immunological model of distributeal detection and its application to computer security[ D]. New Mexico: University of New Mexico, 1999.

共引文献19

同被引文献54

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部