期刊文献+

基于遗传算法的入侵检测技术的发展及关键问题研究

Development of Intrusion Detection based on GeneticAlgorithms and research on Key issues
下载PDF
导出
摘要 入侵检测技术作为防火墙之后的第二道防线,当前研究者致力于进行全面、快捷、无误的检测出每一帧入侵数据的研究。文章分析当前入侵检测技术的发展方向,在基于遗传算法的入侵检测训练中,重点研究基因编码以及适应度函数的构造问题。实验仿真表明该方法能够取得满意的结果。 As intrusion detection become the second line of defense after the firewall,researcher worked hard at detecting each frame of intrusion data comprehensively,efficiently and correctly.This paper analyzes the development trend of current intrusion detection.The gene encoding and the structural problems of fitness function are researched specially.Simulation indicated that the method can achieve satisfactory results.
作者 谢文
出处 《大众科技》 2012年第2期10-12,9,共4页 Popular Science & Technology
关键词 入侵检测 遗传算法 适应度函数 Intrusion detection Genetic algorithms Fitness function
  • 相关文献

参考文献11

二级参考文献78

  • 1胡华平 等.网络入侵检测、预警和安全管理技术(863-104-02-02)申请书[R].,2001..
  • 2[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 3[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.
  • 4[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41.
  • 5[4]Javitz, H.S., Valdez, A. The SRI IDES statistical anomaly detector. In: Teresa, F.L., ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1991.
  • 6[5]Sobirey, M. Adaptive intrusion detection system (AID). 1998. http://www-rnks. informatik.tu-cottbus.de/~sobirey/aid.e.html.
  • 7[6]Heberlein, L.T., Dias, G.V., Levitt, K.N., et al. A network security monitor. In: IEEE ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1990. 296~304.
  • 8[7]Snapp, S.R., Brentano, J., Dias, G.V., et al. A system for distributed intrusion detection. In: Teresa, F.L., ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1991.
  • 9[8]Clifford, K., Porras, P.A. A common intrusion detecction framework. 1997. http://seclab.cs.ucdavis.edu/cidf.
  • 10[1]Denning D E. An intrusion detection model. IEEE Trans Software Engineering, 1987,2(2):222-232

共引文献153

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部