期刊文献+

一种自适应的多级入侵检测模型 被引量:3

An Introduction of an Adaptive Cascaded Intrusion Detection Model
下载PDF
导出
摘要 网络入侵检测是互联网安全领域研究的热点问题。传统的基于异常的入侵检测方法采用单一的检测模型对各类数据进行检测,导致漏报率高,且缺乏模型的动态更新机制,导致模型自适应差。针对上述问题,提出了一种具有自适应性的多级入侵检测模型ACIDM(Adaptive Cascaded Intrusion Detection Model)。ACIDM层级部署多个检测模型,各级模型之间通过检测反馈对模型进行动态更新和协同训练。实验证明,与单一检测模型相比,ACIDM检测器的多样性、层级性和自适应性,使得ACIDM在保证检测精度的同时能明显降低对入侵的漏报率,且这种优势在小样本情况下尤为显著。 The detection of network intrusion is a hot topic in the field of internet security. Traditional intrusion detection methods based on anomaly not only use a single detection model to detect all the data, but also lack dynamic update mechanism of the model, which lead to high false acceptance rate and poor adaptability of the model. In response to these problems, this paper proposes a multi layer intrusion detection model capable of adaptability: ACIDM(Adaptive Cascaded Intrusion Detection Model ). ACIDM deploys multiple detection models hierarchically and updates dynamically these models using feedback data. Experiments show that compared with single detection model, ACIDM detectors of diversity, hierarchy and adaptability enable ACIDM to reduce the false acceptance rate of intrusion obviously with high detection precision, and this advantage is especially significant in small sample situation.
出处 《计算机安全》 2013年第10期6-11,共6页 Network & Computer Security
基金 国家自然科学基金(No.61173159) 四川大学青年教师科研启动基金(No.2011SCU11086)
关键词 入侵检测 异常检测 多级检测 自适应性 KDD CUP99 intrusion detection &nomaly detection: cascaded detection adaptability KDD CUP99
  • 相关文献

参考文献21

  • 1Denning D E. An intrusion-detection model[J]. Software Engineering, IEEE Transactions.
  • 2Jiang L, Zhang H, Cai Z naive ]3ayes[J]. Knowledge on, 1987 (2): 222-2;32.
  • 3A novel Bayes model: hidden and Data Engineering, IEEE Transactions on, 2009, 21(10): 1561-1571.
  • 4Baig Z A, Shaheen A S, AbdelAal P . An AODE-based intrusion detection system for computer networks[C]//Internet Security (WorldCIS), 2011 World Congress on. IEEE, 20 28-35.
  • 5Amiri F, P ezaei Yousefi M M, L information-based feature selection systems[J]. Journal of Network and 2011, 34(4): 1184 1199.
  • 6Liang H. Wei wu P., Fei P . An Adaptive Anomaly Detection Based on Science and Engineer Conference on. IEEE, Hierarchical C ing (ICISE), 2009, 1626 ustering[C]//Information 2009 1st Intern&tion& 1629.
  • 7Srinivasa K G for Detecting Anoma Systems[M]//Advances Technology. Networks Heidelberg, 2012:582 Appli y in in C and -59: cation of Network Genetic Algorithms Intrusion Detection omputer Science and Information Communications. Springer Berlin.
  • 8Horng S J, fntrusion support 2011, detection Su M system vector m&chines[J] 38(1): 506-513 Y, Chen based on Expert Y H, et &l. A novel hier&rchic&l clustering and Systems with Applications.
  • 9Gupta K K, Nath using conditional random Dependable and Secure 2010, 7(1): 35-49. B, Kotagiri fields for P,. Layered approach ntrusion detection J] Computing, IEEE Transactions on,.
  • 10周志华.半监督学习中的协同训练风范[J].机器学习及其应用,北京:清华大学出版社,2007:259275.

同被引文献38

  • 1沈海波,洪帆.基于策略的Web服务访问控制研究[J].计算机科学,2007,34(5):107-110. 被引量:5
  • 2李晓峰,冯登国,徐震.一种通用访问控制管理模型[J].计算机研究与发展,2007,44(6):947-957. 被引量:8
  • 3寇晓蕤,王清贤.网络安全协议:原理、结构与应用[M].北京:高等教育出版社,2009.
  • 4IPSecVPN技术规范[K].国家密码管理局,2008-01-08.
  • 5Luis Martin Garcia. Programming with Libpcap - Snifiqng the Network From Our Own Application[J]. Hakin9,2008, ( 2 ) :38-46.
  • 6周志洪,蒋兴浩,李建华,等.基于流的IPSecVPN协议深度检测方法[P].中国,200810038552.
  • 7昊荣焕,周锋.基于Libpcap的高速率数据包捕获与解析[EB/OL]中国科技论文在线,2012-09-21.
  • 8Damien Rame. How to fix L2TP/IPSec PSK VPN connection on Android ICS 4.0.x[EB/OL].http://www.vircom.com/security/how-to- fix-12tpipsec-psk-vpn-connection-on-android-ics-4-0-x/, 2012- 10-12.
  • 9夏鲁宁,荆继武.一种基于层次命名空间的RBAC管理模型[J].计算机研究与发展,2007,44(12):2020-2027. 被引量:12
  • 10金莉,卢正鼎,赵峰.多域环境下安全互操作研究进展[J].计算机科学,2009,36(2):47-54. 被引量:4

引证文献3

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部