期刊文献+

基于贝叶斯的入侵检测模型与仿真研究 被引量:2

The Intrusion Detection Model and Simulation Study Based on the Bayesian
下载PDF
导出
摘要 本文提出了一种基于贝叶斯的网络入侵检测模型.首先,使用主成分分析法提取网络数据包关键属性、消除冗余属性、降低维数,再用贝叶斯分类器进行分类.结果表明,该模型不但提高了入侵检测的效率,而且也加快了检测速度,更适合当前的复杂网络检测. This paper proposes a network intrusion detection model based on Bayesian . First , the principal component analysis (PCA) was used to extract the key ability ,eliminate the redundant attributes ,reduce the data dimension ,then use the Bayesian classifier to classify .The simulation results show that the model improves the efficiency of the intrusion detection and speed up the detection speed , and is suitable for the current complex network intrusion detection .
作者 章倩 周健
出处 《微电子学与计算机》 CSCD 北大核心 2013年第11期119-122,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60873194)
关键词 网络安全 网络入侵 主成分分析 贝叶斯分类器 network security network intrusion PCA Bayesian classifier
  • 相关文献

参考文献7

二级参考文献47

  • 1孙江文,王崇骏,王珺,陈世福.L^2DLNB:懒惰学习双层朴素贝叶斯分类器[J].计算机科学,2007,34(1):136-139. 被引量:1
  • 2[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 3[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 4[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 5[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 6[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 7[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 8Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 9Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 10Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.

共引文献225

同被引文献19

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部