期刊文献+

基于粗粒度模型遗传算法在网络入侵检测系统中的应用研究 被引量:2

The apply research of genetic algorithm based on coarsegrained model in net-work intrusion setection system
原文传递
导出
摘要 网络的发展越来越迅速,各种智能型的网络入侵检测系统也越来越受到人们的重视.本文在分析了各种入侵检测系统的基础上提出了一种基于粗粒度模型遗传算法的网络入侵检测系统,让各个处理器能够并行地进行遗传算法的操作,重新合理地设计了适应度函数,使遗传“基因”的取舍和利用更加合理,使算法的性能和运行速度得到了提高,充分发挥了遗传算法在网络入侵检测系统中的应用. The development of the Internet is more and more fast, all kinds of intelligent net- work intrusion detection system(NIDS) are more recognized by people. This paper put forward a coarse-grained model genetic algorithm NIDS, let all processor can do genetic algorithm by attributed manner, at the same time, recommend an new operator, redesign a reasonable fitness function, let the use of 'gene' is more reasonable, develop the performance and speed of the arithmetic, make full use of the genetic algorithm in NIDS.
作者 罗安坤 李甦
出处 《云南大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第S2期51-55,共5页 Journal of Yunnan University(Natural Sciences Edition)
基金 云南省教育厅应用基础研究重点项目(03Z180A)
关键词 网络入侵检测系统 并行遗传算法 智能 粗粒度模型 适应度函数 net-work intrusion detection system (NIDS) collateral genetic algorithm (AG) intelligence coarse-grained model fitness function
  • 相关文献

参考文献4

二级参考文献9

  • 1Yun QX, Huang GQ, Wang ZQ. Genetic Algorithm and Genetic Programming. Beijing: Publishing House of Metallurgy Industry,1997 (in Chinese).
  • 2Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA. A sense of self for Unix process. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996.
  • 3Hofmeyr SA, Forrest S. Architecture for an artificial immune system. Evolutionary Computation Journal, 2000,8(4):443-473.
  • 4Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Proceedings of the1999 IEEE Symposium on Security and Privacy. 1999.
  • 5Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium. 1998.
  • 6Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA, May 1999.
  • 7IATF Release 3.0, Host-Based Detect & Respond Capabilities Within Computing Environments. 2000.
  • 8KevinRichards.NetworkBasedIntrusionDetection:A Review ofTechnologies[].Computers and Security.1999
  • 9Mukherjee.B,Heberlein.L.T.NetworkIntrusionDetection[].IEEE Network.1994

共引文献28

同被引文献4

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部