期刊文献+

自体集网络入侵检测中的高效寻优算法仿真 被引量:14

Optimizing Algorithm Simulation of Network Intrusion Detection of Autologous Set
下载PDF
导出
摘要 延迟容忍网络环境复杂,自体集数据规模较大造成的时空上的巨大消耗而难以处理,导致传统网格入侵匹配的数据分类过程收敛速度慢、局部最优等缺陷。为了提高网格入侵特征匹配效率,提出一种基于重复博弈的自体集网络入侵检测中的高效寻优算法。算法利用了入侵数据特征在空间上的相对集中性,在分类概率计算中,加入一种约束计算过程的博弈因子,在概率匹配过程中,通过数据博弈消除多次概率对比,并加入博弈约束计算最优反应函数,将最优反应函数求解过程看作是一个博弈的过程,计算分类优化达到的极大值。仿真结果表明,改进算法的分类匹配时间复杂度有了一定程度的降低,优化效果较为明显。 In order to improve the efficiency of the grid intrusion feature matching,we proposed an efficient optimization algorithm based on repeated game network intrusion detection of autologous set.We utilized the characteristics of the data in space invasion relative concentration,and in the classification probability calculation,we added a constraint factor calculation process of the game.In the matching process of the probability,we eliminated the multiple probability comparison through data game,joined the game constrained computing best-response functions,and calculated the maximum value of classification optimization.Simulation results show that the complexity of the classification matches time has reduced to a certain degree in this improved algorithm,and the optimization results are obvious.
作者 张辉
出处 《计算机仿真》 CSCD 北大核心 2013年第8期297-300,共4页 Computer Simulation
基金 山西省自然科学基金项目(2010011022-2) 2011年度山西省高校科技开发项目(20111134) 2011年度山西省高等学校教学改革项目(J2011117) 2011年度山西大学商务学院科研基金项目(JG201102)
关键词 网格计算 任务调度 重复博弈 Grid computing Task scheduling Repeated game
  • 相关文献

参考文献8

二级参考文献31

  • 1段盛,李仁发.嵌入式建模中带有时间扩展的UML状态图的形式化方法[J].计算技术与自动化,2007,26(1):108-110. 被引量:4
  • 2Heinzelman W,Kulik J,Balakrishnan H.Adaptive protocols for information dissemination in wireless sensor networks[C]//Proceeding of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking.Seattle,WA,August 1999.
  • 3Intanngonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks[C]//Proceeding of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking.Boston,MA,August 2000.
  • 4Heinzelman WR,Chandrakasan AP,Balakrishnan B.EnergyEfficient Communication Protocol for Wireless Microsensor Networks[C]//Proc.33rd Hawaii Int.Conf.System Science.Maui,HJ,Jan.2000.
  • 5]Xu Y,Heidemann J,Estrin D.Geography-informed energy conservation for ad hoc routing[C]//Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking.Rome,Italy,July 2001.
  • 6Yu Y,Estrin D,Govindan R.Geographical and Energy-Aware Routing:A Recursive Data Dissemination Protocol for Wireless Sensor Networks[R].UCLA-CSD TR-01-0023.UCLA Computer Science Department,May 2001.
  • 7Lindsey S,Raghavendra C S.PEGASIS:Power Effident Gathering in Sensor Information System[C]//Proceedings of the IEEE Aerospace Conference.Big Sky,Montana,March 2002.
  • 8Younis O,Fahmy S.HEED:A Hybrid,Energy-efficient,Distributed Clustering Approach for Ad Hoc Sensor Networks[J].IEEE Transaction on Mobile Computing,2004,1(3):366-379.
  • 9Estrin D,et al.Next centurychallenges:Scalable Coordination in Sensor Networks[C]//Proceedings of the 5th Annual ACM/IEEE International Corderence on Mobile Computing and Networking,Seattle,WA,August 1999.
  • 10Gdc Jong.A UML-based design methodology for real-time and embedded systems[C] //Proceeding of DATE 02.

共引文献90

同被引文献64

  • 1BIMAL K M,GHOLAM M A.Differential Epidemic Model of Virus and Worms in Computer Network[J].International Journal of Network Security,2012,14(3):149-155.
  • 2ZHU Q Y,YANG X F,YANG L X,et al.Optimal Control of Computer Virus under a Delayed Model[J].Applied Mathematics and Computation,2012,218(23):11 613-11 619.
  • 3Bimal K M,Gholam M A.Differential epidemic model of virus and worms in computer network [J].International Journal of Network Security,2012,14(3):149-155.
  • 4Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619.
  • 5Bimal K M, Gholam M A. Differential epidemic model of virus and worms in computer network [J]. International Journal of Network Security,2012,14(3) : 149-155.
  • 6Li Hong, Qian Chang-j i, Sun Li-zhen, et al. Simulation of a flexi- ble polymer tethered to a flat adsorbing surface [J]. Journal of Applied Polymer Science, 2012,124 : 282-287.
  • 7Zhu Q Y, Yang X F, Yang L X, et al. Optimal control of computer virus under a delayed model [J]. Applied Mathematics and Com putation, 2012,218(23) : 11613-11619.
  • 8LI Hong, QIAN Chang-Ji, SUN Li- Zhen, et al. Simulation of a flexible polymer tethered to a flat adsorbing surface [J]. Journal of Applied Poly- mer Science, 2012(124).
  • 9刘衍珩,付枫,朱建启,孙鑫.基于活跃熵的DoS攻击检测模型[J].吉林大学学报(工学版),2011,41(4):1059-1064. 被引量:22
  • 10王晟,赵壁芳.基于模糊数据挖掘和遗传算法的网络入侵检测技术[J].计算机测量与控制,2012,20(3):660-663. 被引量:28

引证文献14

二级引证文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部