期刊文献+

基于遗传算法的入侵检测技术研究

The Study of Intrusion Detection based on Genetic Algorithm
下载PDF
导出
摘要 为了提高入侵检测在网络安全应用领域的效率以及准确度,对当前各类入侵检测技术方法的优缺点进行了比较,重点对基于遗传算法的入侵检测技术进行了分析,最终通过较好的基因编码以及改进的适应度构造函数,提高了基于遗传算法的入侵检测的效率及准确度,并使用仿真实验验证了改进后方法的有效性。 To improve the efficiency and accuracy of intrusion detection technology, this paper analyses the advantages and shortcomings of current existing intrusion detection technolo- gies, especially the intrusion detection technologies based on genetic algorithm. Finally, the efficiency and accuracy of intrusion detection based on genetic algorithm was enhanced by im- proving encoding and fitness construction function, simultaneously the simulation results showed affectivity of the algorithm.
作者 贾邓 杨颖
出处 《广西科学院学报》 2013年第4期259-261,共3页 Journal of Guangxi Academy of Sciences
关键词 入侵检测 遗传算法 适应度函数 intrusion detection, genetic algorithm, fitness function
  • 相关文献

参考文献7

二级参考文献22

  • 1Ye N, Li X, Chen Q, et al. Probabilistic techniques for intrusion detection based on computer audit data[J]. IEEE Trans SMC-A, 2001,31(5):266--274.
  • 2Agrawal R, Imielinski T, Swami A. Mining association rules between sets of items in large databases[A]. Buneman P, Jajodia S. Proceedings of the ACM SIGMOD Conference on Management of data[C]. Washington: ACM Press, 1993. 207--216.
  • 3TanenbaumAS.计算机网络(第3版)[M].北京:清华大学出版社,1998..
  • 4Stevens W. Unix Network Programming. Volume 1: Networking APIs; Sockets and XTI. 2nd Edition. Beijing: Tsinghua University Press, 1999(in Chinese)(UNIX网络编程(第2版)第1卷: 套接口API和X/Open传输接口API. 北京: 清华大学出版社, 1999)
  • 5Noureldien N A, Osman I M. A stateful inspection module architecture. In: Proceedings of TENCON 2000, Kuala Lumpur, Malaysia, 2000.259~265
  • 6Postel J. Transmission Control Protocol. RFC 0793, 1981
  • 7Lemon J. Resisting SYN flood DoS attacks with a SYN cache. In: Proceedings of USENIX BSDCon 2002, San Francisco, California, USA, 2002.89~98
  • 8Wang H, Zhang D, Shin K G. Detecting SYN flooding attacks. In: Proceedings of Infocom 2002, New York, USA, 2002.1530~1539
  • 9Balasubramaniyan J S, Garcia-Fernandez J O, Isacoff D, Spafford E, Zamboni D. An architecture for intrusion detection using autonomous agents. In: Proceedings of Computer Security Applications Conference, Phoenix, Arizona, USA, 1998. 13~24
  • 10SANDHU R S. Authentication, access control and intrusion detection[J]. IEEE Communications Magazine, 1994, 32(9): 40-48.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部