期刊文献+

基于加权移动窗口入侵检测系统模型

Based on weighted moving window method of intrusion detection model design
原文传递
导出
摘要 本文首先简要介绍了移动窗口的工作原理,加权的移动窗口概念及原理。该方法能够识别并适应概念飘移,根据数据流的概念漂移的状况自动调整训练窗口并对检测模式进行及时的更新,从而可以作为一种入侵检测的方法。在该理论的基础之上设计了基于加权移动窗口入侵检测系统模型,实现了该框架的一个系统原型。 This paper briefly describes the works of the moving window and weighted moving window concept and principle. It also can automatically adjusts itself according to situation of data flow by training the window to update timely. In view of these advantages, it can be used as a method of intrusion detection to ensure theconUnuous data t]ows to be focused in classification processing of intrusion detection. Based on this principle, a weighted moving window method of intrusion detection are designed.
作者 钱峰
出处 《网络安全技术与应用》 2013年第5期14-17,共4页 Network Security Technology & Application
关键词 入侵检测 移动窗口 加权的移动窗口 Intrusion Detection Sliding Window Weighted Sliding Window
  • 相关文献

参考文献6

二级参考文献17

  • 1李平,黄迪明.基于智能体的自适应入侵检测系统[J].成都信息工程学院学报,2004,19(4):535-540. 被引量:1
  • 2Brian Babcock ,Shivnath Babu ,Mayur Datar et al.Models and Issues in Data Stream Systems[C].In : Proc ACM SIGACT-SIGMOD Symp on Principles of Database Systems,2002:1~16
  • 3S Madden,M Shah,J M Hellerstein et al. Continuously Adaptive Continuous Queries over Streams[C].In:SIGMOD,2002:49~60
  • 4S Chandrasekaran,M J Franklin. Streaming Queries over Streaming Data[C].In :Proc of the 28th Int Conf on Very Large Data Bases,2002: 203~214
  • 5A Arasu,B Babcock,S Babu et al. Characterizing Memory Requirements for Queries over Continuous Data Streams[C].In :Proc ACM SIGACTSIGMOD Symp on Principles of Database Systems,2002:221~232
  • 6Jaewoo Kang,Jeffery F Naughton,Stratis D Viglas.Evaluating Window Joins over Unbounded Streams[C].In:ICDE Conference 2003
  • 7Lukasz Golab ,M Tamer Ozsu. Processing Sliding Window Multi-Joins in Continuous Queries over Data Streams[R].Waterloo University Technical Report CS-2003-01,2003-02
  • 8Moustafa A Hammad,Michael J Franklin,Walid G Aref et al. Scheduling for shared window joins Over Data Streams[C].In:Proc of the 29th Int Conf on VLDB,2003
  • 9Mukherjee B Heberlein,K Levitt.Network intrusion detection[J].IEEE Network, 1994 ; 8 (3) : 26-41
  • 10Sundaram A.An introduction to intrusion detection[J].Crossroads,The ACM Student Magazine,1996,2(4)

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部