期刊文献+

基于ACBM的高速网络入侵检测算法研究

Research on High Speed Network Intrusion Detection Algorithm Based on the ACBM Rules Matching
下载PDF
导出
摘要 本文提出一种基于ACBM规则匹配的网络入侵算法,通过定义入侵规则,将入侵数据与数据库中的数据规则化,然后根据ACBM算法实现入侵规则的匹配,这样就避免了传统算法对单一数据串的逐一匹配,大大缩短了高速网络检测所消耗的时间.实验证明,这种方法能够有效提高网络入侵检测的效率,对高速网络的检测效率也有了很大的改善,取得了满意的结果. This paper proposes a ACBM rules based on matching network intrusion algorithm,through defining invasion rules and get the invasion data and data in database regularization,then based on the ACBM algorithm to complete the invasion rules matching.This prevents the traditional algorithm for a single data string by the match,greatly reducing the high-speed network detection spending time.Experiments show that the method can effectively improve the efficiency of the network intrusion detection,high-speed network detection efficiency also has made a lot of improvement,and satisfactory results were obtained.
作者 谈娴茹
出处 《微电子学与计算机》 CSCD 北大核心 2012年第3期35-38,42,共5页 Microelectronics & Computer
关键词 规则匹配 入侵检测 数据采集 rules matching intrusion detection data acquisition
  • 相关文献

参考文献4

二级参考文献26

  • 1J A K Suykens, J Vandewalle. Recurrent Least Squares Support Vector Machines [ J ]. IEEE Transactions on Circuits and Systems, 2000,7(7) :1109-1112.
  • 2VN Vapnik. Statistical Learning Theory [ M ]. New York. New York Wiley. 1998.23-55.
  • 3Bai Rujiang, Wang Yue. An effective hybrid classifier base on rough sets and neural networks[ C ]. Proceedings of the 2006 LEEE International Conferrence on Web Intelligent Agent Technology. Dec,2006.57-62.
  • 4Chen Bor-Sen, Peng Sen-Chueh and Wang Ku-Chen. Traffic Modeling, Prediction, and Congestion Control for High- Speed Networks : A Fuzzy AR Approach [ J ]. IEEE Transaction on Fuzzy Systems. 2000,8(5) : 491-506.
  • 5L Zhang, W Zhou, L C Jiao. Wavelet support vectoe machine[ J]. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cy- bernetics, 2004,34( 1 ) :34-39.
  • 6D R Wilson, T R Martinez. Improved heterogeneous distance functions . Journal of Artificial Intelligence Research [ J ]. 1997, 6(1) : 1-34.
  • 7Shin Hyunjung, Chao Sungzoon. Invariance of Neighborhood Re- lation Under Input Space to Feather Space Mapping[ J]. Pattern Recognition Letters, 2004,26(6) :707-718.
  • 8A Apostolico.R Giancarlo.The Boyer-Moore-Galil string searching strategies revisited[J].SIAM J Comput,1986;15(1):98-105.
  • 9Coit C J,Staniford S,MeAlemey J.Towards faster pattern matching for intrusion detection or exceeding the speed of snort[C].In:DARPA Infromation Surcicability Conference and Exposition,2001.
  • 10奚嘉迪.后浪推前浪一新老IDS技术的比较[EB/OL].http://www.ccw.com.cn,.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部