期刊文献+

基于神经网络的入侵检测系统的设计与实现 被引量:17

DESIGN AND IMPLEMENTATION OF NEURAL NETWORK-BASED INTRUSION DETECTION SYSTEM
下载PDF
导出
摘要 由于传统的入侵检测系统无法识别未知攻击,为了弥补其不足,设计和实现一个基于蜜罐和BP神经网络的入侵检测系统BPIDS。该系统包含两阶段检测模型,它们分别是应用感知器学习方法的感知器检测模型和应用BP神经网络的BP网络检测模型。其中感知器检测模型用于划分正常类和攻击类,而BP网络检测模型则在此基础上对一些具体的攻击类型进行识别。最后,设计实验对BPIDS的检测能力进行测试。实验结果表明,BPIDS对被监控网络中的入侵行为具有较好的检测率和较低的误报率。 Since traditional IDS(intrusion detection system) can not identify the unknown attacks,to make up the defect of it,an intrusion detection system based on BP neural network and honeypot(BPIDS) is designed and implemented in this paper.The system contains a two-phase detection model,the perceptron detection model applying the perceptron learning method and the BP network detection model applying BP neural network respectively.The perceptron detection model is used to distinguish the attack class from the normal classes,while the other model focuses on identifying some specific attack types on that basis.At last,an experiment is designed to test the detection capability of BPIDS.The results of the experiment show that the BPIDS has a better detection rate and a lower false alarm rate on intrusion activities in monitoring network.
作者 汪洁
出处 《计算机应用与软件》 CSCD 北大核心 2013年第5期320-322,共3页 Computer Applications and Software
基金 中南大学自由探索计划基金项目(2011QNZT035)
关键词 入侵检测 感知器 BP网络 Intrusion detection Perceptron BP network
  • 相关文献

参考文献6

二级参考文献71

  • 1杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 2张新宇,卿斯汉,李琦,李大治,何朝辉.一种基于本地网络的蠕虫协同检测方法[J].软件学报,2007,18(2):412-421. 被引量:25
  • 3陈博,方滨兴,云晓春.分布式蠕虫检测和遏制方法的研究[J].通信学报,2007,28(2):9-16. 被引量:12
  • 4常卫东,王正华,鄢喜爱.基于集成神经网络入侵检测系统的研究与实现[J].计算机仿真,2007,24(3):134-137. 被引量:29
  • 5周荃,王崇骏,王珺,周新民,陈世福.基于人工智能技术的网络入侵检测的若干方法[J].计算机应用研究,2007,24(5):144-149. 被引量:33
  • 6SUN Wen-chen, CHEN Yi-ming. A rough set approach for automatic key attributes identification of zero-day polymorphic worm[ J]. Expert Systems with Applications,2009,36(3 ) :4672-4679.
  • 7PERDISCI R, DAGON D, LEE W, et al. Misleading worm signature generators using deliberate noise injection[ C]//Proc of 2006 IEEE Symposium on Security and Privacy. Washington DC : IEEE Computer Society, 2006 : 17- 31.
  • 8WANG Jie,WANG Jian-xin, CHEN Jian-er,et al. An automated sig- nature generation approach for polymorphic worm based on color cod- ing[ C ]//Proc of IEEE International Conference on Communications. Washington DC : IEEE Computer Society, 2009 : 1- 6.
  • 9STANIFORD S, PAXSON V, WEAVER N. How to own the Internet in your spare time[ C]//Proc of the llth USENIX Security Symposi- um. Berkeley : USENIX, 2002 : 149-167.
  • 10MANNA P K, CHEN S, RANKA S. Inside the permutation-scanning worms: propagation modeling and analysis [ J]. IEEE/AGM Trans on Networking,2010,8(3) :858-870.

共引文献321

同被引文献130

引证文献17

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部