期刊文献+

模糊C算法在网络入侵防护中的仿真研究 被引量:5

Simulation Research on the Fuzzy C Algorithm In Network Intrusion Protection
下载PDF
导出
摘要 随着计算机网络的不断发展,网络安全变得越来越重要。近年来,入侵检测成为了一个新型的网络安全策略,达到了对网络系统安全的动态检测和监控的目的。介绍了入侵检测系统的体系结构和检测方法,并提出了一种基于多种检测方法和技术的综合入侵检测系统,介绍了入侵检测系统的模糊C算法,同时给出了基于这种算法的仿真实验结果。仿真结果表明,综合入侵检测系统具有一定实用性和有效性。 Network security becomes more and more important with the continuous development of computer network.In rencent years,intrusion detection became a new network security policy,the purposes of dynamic detecting and monitoring of the network security was achieved.The intrusion detection system and detection method were Introduced,the integrated intrusion detection system that based on varieties of detection methods and technology were put forward.Introduced the invasion behavior rules in the knowledge base,and optimized the system through data analysis and matching,ensured that the network system security to obtain better results.
作者 韦新丹
出处 《科技通报》 北大核心 2012年第12期221-223,共3页 Bulletin of Science and Technology
关键词 计算机网络 综合入侵检测系统 网络系统安全 模糊C算法 computer network integrated intrusion detection system network security fuzzy C algorithm
  • 相关文献

参考文献4

二级参考文献8

  • 1王柏.分布式计算环境[M].北京邮电大学出版社,..
  • 2Wenke Lee,Stolfo S J,Mok K W.A data mining framework for building intrusion detection models[J].The 1999IEEE Symposiumon Security and Privacy,1999.
  • 3Portnoy L,Eskin E,Stolfo S J.Intrusion detection with unlabeled data using clustering.Workshop on Data Mining Applied to Security(DMSA-2001)[J].2001(11).
  • 4AsimRoy S G,Miranda R.An Algorithm to Generate Radial Basis Function(RBF)-LikeNets for Classification Problem[J].Neural Networks,1995,8(2):179-201.
  • 5Jou Yfrank,Rome Lab USA Tech Rep:CDRL A005 1997
  • 6王柏,分布式计算环境
  • 7李腊元.通信协议形式化模型的研究[J].计算机学报,1998,21(5):419-427. 被引量:4
  • 8李辉,管晓宏,昝鑫,韩崇昭.基于支持向量机的网络入侵检测[J].计算机研究与发展,2003,40(6):799-807. 被引量:79

共引文献91

同被引文献29

引证文献5

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部