期刊文献+

基于MA及LVQ神经网络的智能NIPS模型与实现 被引量:3

Intelligent NIPS Model and Implementation Based on MA and LVQ Neural Networks
下载PDF
导出
摘要 为了提高入侵防御系统的智能性和准确率,在讨论入侵防御技术特性和关键技术的基础上,分析了利用MA(MobileAgent)及LVQ(Learning Vector Quantization)神经网络构建入侵防御系统的优势,以及LVQ神经网络的结构特性和学习算法,提出基于MA及LVQ神经网络的新智能入侵防御系统模型结构,概述了新模型的实现方法,并用Matlab算法进行了仿真实验.结果表明,基于MA及LVQ神经网络的新智能入侵防御系统模型整体防御准确率与检测辨识性能都有较大提高. To improve the aptitude and accuracy of intrusion prevention system,this paper analyzed the advantages of the intrusion prevention system based on MA and LVQ neural networks,the structural characteristics of LVQ neural networks and learning algorithms on the basis of intrusion prevention technical characteristics and key technologies discussing.This paper proposed a new intelligent intrusion prevention system model and structure based on MA and LVQ neural networks,presented the implementation method of the new model,done simulation experiments in MATLAB software.The results indicate the total prevention blocking accuracy and detection identification performances of the new intelligent intrusion prevention system model based on MA and LVQ neural networks have been improved greatly.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第8期1836-1840,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60803130)资助 上海电机学院重点学科项目(07XKJ01)资助
关键词 移动代理MA 学习向量量化LVQ LVQ神经网络 基于网络的入侵防御系统NIPS 模型构建与实现 mobile agent(MA) learning vector quantization(LVQ) LVQ neural networks network intrusion prevention system(NIPS) model construction and implementation
  • 相关文献

参考文献5

二级参考文献24

  • 1张尧学,彭玉坤,周悦芝,方存好.可管理多媒体网络计算机(MMNC)[J].电子学报,2003,31(z1):2054-2058. 被引量:21
  • 2张尧学.透明计算:概念、结构和示例[J].电子学报,2004,32(F12):169-174. 被引量:48
  • 3K. Diamantaras, S.Y. Kung, Principal Component Neural Networks: Theory and Applications[M], Wiley, NY, USA, 1996.
  • 4KDD Cup Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html[EB/OL], March 2006.
  • 5Battistoni R, Gahrielli E, Mancini L V. A host intrusion prevention system for windows operating systems [C]// ESORICS 2004, Sophia Antipolis, French Riviera, France, 2004:352 - 368.
  • 6Guimarase M, Murray M. Overview of instrusion detection and instrusion prevention [C]//Proc the 5th Annual Conference on Information Security Curriculum Development. Kennesaw, Geogra: ACM, 2008: 44- 46.
  • 7Apap F, Honig A, Hershkop S, et al. Detecting malicious software by monitoring anomalous Windows registry accesses [C]// RAID 2002, Zurich, Switzerland, 2002: 36- 53.
  • 8MCGRAW G,MORRISETT G.Attacking malicious node:a report to the infosec research council[J].IEEE Software,2000,17(5):33-41.
  • 9LEE W,STOLFO S J,MOK K W.A data mining framework for building intrusion detection models[C] //Proc of IEEE Security and Privacy.1999:120-132.
  • 10VX heavens[EB/OL].(2010)[2007].http://vx.netlux.org.

共引文献14

同被引文献60

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2谷雨,赵佳枢,张天军,徐宗本.基于免疫多样性的分布式入侵检测算法[J].西安交通大学学报,2006,40(10):1052-1055. 被引量:6
  • 3唐秋华,刘保华,陈永奇,周兴华,丁继胜.结合遗传算法的LVQ神经网络在声学底质分类中的应用[J].地球物理学报,2007,50(1):313-319. 被引量:27
  • 4吴博.电力系统计算机网络信息安全分析及防护[C]//第二十九届中国电网调度运行会议论文集.北京:中国电力出版社,2005:1-9.
  • 5贾铁军,甘泉.软件工程与实践[M].北京:清华大学出版社,2012:132-226.
  • 6贾铁军,甘泉.数据库原理应用实践SQLServer2012[M].北京:科学出版社,2013:191-235.
  • 7Jia Tiejun, Wang Xiaogang. The Research and De- sign of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage[J. International Journal of Digit- al Content Technology and Its Applications, 2011 (8) : 158-263.
  • 8Li bing, He yigang, Guo fengming , et al. Prediction of Passive UHF RFIDg Discrimination BAsed on LVQ Neural Network Method The 6th International Conference on Wireless Communications, [ M ]. chengdu : Network and Mobile Computing septemper, 2010,23 - 25.
  • 9Gavin R. Lloyd, Richard G. Brereton, Rita Faria et al. Learning Vector Quantization for Muhiclass Classification: Application to Characterization of Plastics [ J ]. Journal of Chemical Information and Modeling,2007,47 (4) : 1553 - 1563.
  • 10Kennedy J, Eberhart R. Particle swarm optimization [ C ]//Proceed- ings of IEEE International Conference on Neural Networks. Piscat- away: IEEE, 1995 : 1942 - 1948.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部