期刊文献+

基于粒计算的入侵检测系统研究 被引量:2

Research of Intrusion Detection System Model Based on Granular Computing
下载PDF
导出
摘要 入侵检测系统作为保护网络系统安全的关键技术和重要手段,已经成为当前网络安全研究方面的热点。粒计算作为人工智能领域中的一种新理论和新方法,将其应用在入侵检测中具有重要的现实意义。为了讨论该方向上尚未解决的问题和发展趋势,采用了用等价关系来描述粒,用粒来描述概念的方法,并用实验证明了该模型能非常有效地将正常和异常的系统调用序列区分开,得到用粒计算的方法论可以解决入侵检测问题的结论。 The intrusion detection system as a key technology and important means to protect network security has become a hotspot. Granular computing as a kind of new idea and method in the artificial intelligence has important practical significance in intrusion detection. To discuss the direction of unresolving issues and trends of development, the methods of using equivalence relation to describe the granular and using granular to describe the concept are proposed. Besides, the experiment verifies that this model can separate the normal system call from the abnormal one effectively. The conclusion is that the methodology of granular computing can be used to solve the problem of intrusion detection.
作者 邓飞 潘华
出处 《现代电子技术》 2011年第10期115-117,共3页 Modern Electronics Technique
关键词 入侵检测 粒计算 人工智能 网络安全 intrusion deteetion granular computing artificial intelligence network security
  • 相关文献

参考文献14

  • 1张清华,周玉兰,滕海涛.基于粒计算的认知模型[J].重庆邮电大学学报(自然科学版),2009,21(4):494-501. 被引量:22
  • 2刘清,孙辉,王洪发.粒计算研究现状及基于Rough逻辑语义的粒计算研究[J].计算机学报,2008,31(4):543-555. 被引量:26
  • 3邓蔚 王国胤 吴渝.粒计算综述.计算机科学,2004,(31):178-181.
  • 4ZADEH L A. Fuzzy logic-computing with words [J]. IEEE Transactions on Fuzzy Systems, 1996, 4: 103-111.
  • 5ZADEH L A. Towards a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic [J]. Fuzzy Sets and Systems, 1997, 90: 111-121.
  • 6YAO Y Y. Granular compuying: basic issues and possible solutions [C]// Proc. of the 5th Joint Conf. on Information Sciences. Atlantic City, NJ: [s. n.], 2000: 186-189.
  • 7YAO Y Y, ZHONG N. Potential applications of granular computing in knowledge discovery and data mining[C]// Proc. of World Multiconference on Systemics, Cybernetics and Informatics [S.l.]:WMSCI, 1999 :573-580.
  • 8ZADEH L. Fuzzy sets and information granularity [C]// Advances in Fuzzy Set Theory and Applications, North Holland. Amsterdam: [s. n. ], 1979.3-18.
  • 9彭宏.基于粗糙集理论的入侵检测方法研究[J].电子科技大学学报,2006,35(1):108-110. 被引量:13
  • 10鲜继清,郎风华.基于模糊聚类理论的入侵检测数据分析[J].重庆大学学报(自然科学版),2005,28(7):74-77. 被引量:4

二级参考文献95

共引文献73

同被引文献22

引证文献2

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部