期刊文献+

校园网络安全中异常入侵快速定位方法研究 被引量:1

Campus Network Security Abnormal Invasion of Quick Location Methods Research
下载PDF
导出
摘要 研究了校园网络中快速确定异常入侵位置的方法,提出区域入侵关联概率检测方法.以网络节点间的相互关系为基础,根据被入侵区域与其附近区域互相依存的关联程度,估计被异常入侵区域的关联概率.运用概率决策思维迭代锁定被入侵区域.实验证明,该方法能够提高获取校园网络中异常入侵位置的效率,从而保证了校园网络的安全. Study in campus network quickly determined the position of abnormal invasion method.This paper puts forward area associated probability detection method invasion.Network node in the relationship between as the foundation,according to the area and its surrounding area was invaded our interdependence on each other,the connection degree is estimated to be abnormal invasion of the region associated probability.Use probability decision thought iteration lock was invaded area.The experiment shows that,by using the method can improve the campus network for the efficiency of the abnormal invasion position,so as to ensure the security of campus network.
作者 王慧
出处 《微电子学与计算机》 CSCD 北大核心 2012年第3期159-162,共4页 Microelectronics & Computer
关键词 校园网络 异常入侵 入侵关联概率 campus network abnormal invasion invasion associated probability
  • 相关文献

参考文献6

二级参考文献29

  • 1孙韶杰,孙绍俊,李国辉,李红梅.一种改进的声测定位时延估计算法[J].计算机应用,2006,26(11):2696-2697. 被引量:13
  • 2Zhang Y, Lee W, Huang Y A. Intrusion Detection Techniques for Wireless Ad Hoc Networks[J]. ACM/Kluwer Wireless Networks Journal, 2003,9 (5) : 545-556.
  • 3Puttini R S, Percher J-M, Me L, et al. A Modular Architecture for a Distributed IDS for Mobile Ad Hoc Networks[C]//Lecture Notes on Computer Science. vol. 2669, Springer-Verlag, 2003:91-113.
  • 4Jansen W. Intrusion Detection with Mobile Agents[J]. Computer Communications, Special Issue on Intrusion Detection, 2002,25 (15):1392-1401.
  • 5Vassilaras S, Vogiatzis D, Yovanof G S. Security and Cooperation in Clustered Mobile Ad-boc Networks with Centralized Supervision[J]. IEEE Journal on Selected Areas in Communications, Special Issue on Network Security, 2006,24 (2) : 329-342.
  • 6Puttini R,Percher J-M,Mc L,et al. A Fully Distributed IDS for MANET[C] // Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC' 2004). 2004 : 331-338.
  • 7Liu Yu, Li Yang, Man Hong. MAC Layer Anomaly Detection in Ad Hoe Networks[C]// Proceedings of the 6th IEEE Information Assurance Workshop. June 2005:402-409.
  • 8Sun B, Wu K, Pooch U. Routing Anomaly Detection in Mobile Ad Hoc Networks[C]//12th Int'l Conf. on Computer communications and Networks (ICCCN ' 03 ). Dallas, TX, Oct. 2003: 25- 31.
  • 9Novikov D, Yampolskiy R V, Reznik L. Anomaly Detection Based Intrusion Detection[C] // Proceedings of the Third International Conference on Information Technology: New Generations (ITNG'06). April 2006 : 420-425.
  • 10Anjum F, Subhadrabandhu D, Sarkar S. Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols[C]// IEEE 58th Vehicular Technology Conference, vol. 3. IEEE Press, 2003 : 2152-2156.

共引文献16

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部