期刊文献+

基于CMAC网络的异常入侵检测技术 被引量:14

Research on Anomaly Intrusion Detection Based on CMAC
下载PDF
导出
摘要 针对入侵检测系统对异常入侵检测的不足,采用CMAC神经网络,将其应用于对异常入侵行为的检测,并给出了基于CMAC的入侵检测模型.由于CMAC网络是一种联想网络,所以它对未知类型的入侵行为有很好的识别能力.同时,它的学习与修正只涉及很少的神经元,所以其速度很快.最后通过试验证明,应用CMAC神经网络的入侵检测系统相对于传统检测技术,在检测率及误判率上都有所提高. Aiming at the defects of detecting anomaly intrusion for an IDS,CMAC Artificial Neural Network is applied to detect anomaly intrusion behavior of networks,and an IDS model based on CMAC is proposed.Having the capability of association,CMAC can do well in recognizing behaviors of unknown type.In the process of learning and correcting the weight,a few neural cells are changed,so CMAC learns fast.Finally,the result of a simulation experiment testified an increase in both detection rate and misclassified rate of traditional IDS.
出处 《哈尔滨理工大学学报》 CAS 北大核心 2010年第5期65-68,共4页 Journal of Harbin University of Science and Technology
基金 黑龙江省自然科学基金项目(F2007-06) 哈尔滨市科技公关项目(200812AA2CG037)
关键词 入侵检测 CMAC 人工神经网络 intrusion detection CMAC ANN
  • 相关文献

参考文献7

  • 1ZSEBY T, FOKUS F, MOLINA M, et al. Sampling and Filtering Techniques for IP Packet Selection [ EB/OL ]. [2007 - 01 - 20]. http://www, ieff. org/html, charters/psamp-charter, html.
  • 2HELMAN P, BHANGOO J. A Statistically Base System for Prioritizing Information Exploration Under Uncertainty [ J ]. IEEE Transactions on Systems, Man and Cybernetics, Systems and Humans, 1997, Part A:27.
  • 3李恒华,田捷,常琤,杨鑫.基于滥用检测和异常检测的入侵检测系统[J].计算机工程,2003,29(10):14-16. 被引量:12
  • 4STEFANOS M, MARVIN C, DAN Z, et al. A Data Mining Analysis of RTID Alarms [J]. Computer Networks, 2000, 34,571 - 577.
  • 5张兴东,胡华平,况晓辉,陈辉忠.防火墙与入侵检测系统联动的研究与实现[J].计算机工程与科学,2004,26(4):22-26. 被引量:54
  • 6ALBUS J S. A New Approach to Manipulator Control[ J ]. Trans ASME J Dyn Syst Meas Contrl, 1975.97:220 -227.
  • 7SRILATHA C. , AJITH A. , THOMAS P. Feature Deduction and Ensemble Design of Intrusion Detection System [J]. Computer & Security, 2004(9) :26 -32.

二级参考文献3

  • 1满林松 吴亚飚.TOPSEC网络安全体系平台[EB/OL].http://www.yesky.com/20010611/183951.shtml,2000-10.
  • 2[美]Steven Holzner 陶阳 嵩敬波 王锋译.XML完全探索[M].北京:中国青年出版社,2001..
  • 3薛炳蔚 薛静锋 王勇.在安全管理中应用OPSEC[J].计算机世界报,2001-12-20(49).

共引文献64

同被引文献17

引证文献14

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部