期刊文献+

下一代互连网络入侵检测系统研究 被引量:4

Study on Intrusion Detection System for Next-generation Internet
下载PDF
导出
摘要 漏报和误报问题是下一代互联网入侵检测系统亟需解决的问题。传统基于特征的误用检测方法不能适应下一代互联网高带宽环境,无法准确、完整地识别攻击事件,造成检测准确性不高。为了解决上述问题,采用异常检测技术,快速采集网络数据,按"等级"分析、精简数据,以数据挖掘思路,基于非线性支持向量机分类检测数据,准确提取网络正常行为模式,合理设置阈值,保证入侵检测自适应性与准确性。仿真结果表明,下一代互联网入侵检测原型系统能够有效地检测出入侵或异常行为,显著降低漏报率和误报率,有助于保证网络安全。 False negatives and false positives problems are critical for the next - generation Internet intrusion de- tection systems. Nevertheless, traditional signature - based misuse detection methods can not adapt to the high - bandwidth environment of next - generation Internet, and are unable to accurately and completely identify attacks, which results in low detection accuracy. In order to solve the above problems, an anomal detection method was intro- duced in this paper, which then employs fast network data capture technology, analyzes and streamlines data by "lev- el". Meanwhile, on the basis of data mining method, a non - linear support vector machine was employed to classify data and accurately extract normal network behavior patterns, reasonably set threshold, so as to ensure the self - a- daptive and accuracy of intrusion detection. The simulation results of opposite experiment show that the intrusion de- tection system for next - generation Interuet effectively can enhance the ability to detect various unknown attacks and si^nificantlv reduced the false nositives rate and false negative rate.
出处 《计算机仿真》 CSCD 北大核心 2013年第10期337-340,共4页 Computer Simulation
基金 国家自然科学基金(91118003 61003268) 福建省自然科学基金项目(2009J01270)
关键词 下一代互联网 异常检测 检测性能 Next- generation internet Anomaly detection Detection performance
  • 相关文献

参考文献7

  • 1吴建平,林嵩,徐恪,刘莹,朱敏.可演进的新一代互联网体系结构研究进展[J].计算机学报,2012,35(6):1094-1108. 被引量:58
  • 2颜谦和,颜珍平.遗传算法优化的神经网络入侵检测系统[J].计算机仿真,2011,28(4):141-144. 被引量:19
  • 3C Jun, C Xiaowei. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ]. Information Technology and Applica- tions( IFITA), 2010 International Forum on. IEEE, 2010 - 1:384 -388.
  • 4Z Yu. Study on intrusion IPv6 detection system on LINUX [ C ]. Computational Intelligence and Industrial Applications, 2009. PA- CIIA 2009. Asia - Pacific Conference on. IEEE, 2009 - 2:5 - 8.
  • 5C Jun, C Xiaowei. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ]. information Technology and Applica- tions(IFITA), 2010 International Forum on. IEEE, 2010 - 1:384 - 388.
  • 6L Yao, L ZhiTang, L Shuyu. A Fuzzy Anomaly Detection Algo- rithm for IPv6[ C]. Semantics, Knowledge and Grid, 2006. SKG' 06. Second International Conference on. IEEE, 2006:67 - 67.
  • 7A Altaher, S Ramadass, A Almomani. Real time network anomaly detection using relative entropy [ C ]. High Capacity Optical Net- works and Enabling Technologies (HONET) , 2011. IEEE, 2011 : 258 - 260.

二级参考文献8

共引文献74

同被引文献29

  • 1Bahrbegi H, Navin A H, Ahrabi A, et al. A new system to evaluate GA-based elustering algorithms in Intrusion detection alert management system [C] //Second World Congress on Nature and Biologically Inspired Computing. IEEE, 2010: 115-120.
  • 2Mahdi Mohammadi, Ahmad Akbari, Hassan Asgharian. A fast anomaly detection system using probabilistic artificial im- mune algorithm capable of learning new attacks [J]. Evolu- tionary Intelligence, 2014, 6 (3): 135-156.
  • 3Beng L Y, Ramadass S, Manickam S. A comparative study of alert correlations for intrusion detection [C] //International Conference on Advanced Computer Science Applications and Technologies. IEEE, 2013: 85-88.
  • 4A1-Saedi K H, Ramadass S, Alrnomani A, et al. Collection mechanism and reduction of ids alert [J]. International Journal of Computer Applications, 2012, 58 (4): 40-48.
  • 5Taha A E, Ghaffar I A, Eldin A M B, et aL Agent based cor- relation model for intrusion detection alerts [C] //Proceeding of 1EEE International Conference on Intelligence and Security Informaties, 2010: 89-94.
  • 6Ning Xiong. Learning fuzzy rules for similarity assessment in case-based reasoning[J]. Expert Systems with Applications, 2011, 38 (9): 10780-10786.
  • 7Huwaida Tagelsir Elshoush, Izzeldin Mohamed Osman. Alert correlation in collaborative intelligent intrusion detection sys-tems-A survey [J]. Applied Soft Computing, 2011, 11 (7) : 4349-4365.
  • 8李学宝.基于危险理论的入侵检测系统误报率研究[J].计算机与现代化,2011(2):41-43. 被引量:1
  • 9苏家洪.入侵检测系统新技术介绍[J].中国新技术新产品,2012(3):43-43. 被引量:5
  • 10史晓梅,梅红岩,朱田华,周军.一种新的模糊规则提取方法[J].辽宁工业大学学报(自然科学版),2012,32(1):22-26. 被引量:4

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部