期刊文献+

一种基于小区分层挖掘的高伪装病毒检测

Hierarchical Mining High Camouflage Virus Detection Based on A Community
下载PDF
导出
摘要 为了提高网络入侵检测准确率,提出一种基于小区分层挖掘的高伪装病毒检测算法,通过对病毒特征建立多种约束,并且建立病毒检测分层约束模型,对病毒特征进行检测。实验结果表明,相对传统网络入侵检测方法,该算法的检测速度快,检测准确率高,为网络安全提供可靠保障。 The paper proposes a kind of based on hierarchical mining area of high camouflage virus detection algorithm, based on characteristics of virus establish a constraint, and establish virus detection layered constraint model, the characteristics of virus detection. The experimental results show that in comparison with the traditional network intrusion detection method, the algorithm of the detection speed, high accuracy detection for network security, provide a reliable guarantee.
作者 潘大胜
出处 《科技通报》 北大核心 2013年第12期94-96,共3页 Bulletin of Science and Technology
关键词 入侵检测 分层挖掘 高伪装病毒 intrusion detection hierarchical mining high camouflage virus
  • 相关文献

参考文献5

二级参考文献40

  • 1柴晨阳,孙星明,吴志斌,智云生.基于神经网络集成的入侵检测研究[J].计算机应用,2007,27(6):1363-1364. 被引量:3
  • 2Lou Der - Chyuan, Liu Chiang - Lung, Lin Chih - Lin. Message estimation for universal steganalysis using multi - classification support vector machine[ J]. Computer Standards & Interfaces, 2009, 31 (2) :420 -427.
  • 3Huang Cheng - Lung, Wang Chieh - Jen. A GA - based feature selection and parameters optimizationfor support vector machines [J]. Expert Systems with Applications, 2006,31 (2) :231 -240.
  • 4Anderson Alvarenga de Moura Meneses, Marcelo Domellas Machado, Roberto Schirru. Particle Swarm Optimization applied to the nuclear reload problem of a Pressurized Water Reactor [ J ]. Progress in Nuclear Energy, 2009,51 (2) :319 - 326.
  • 5S Suresh, P B Sujit, A K Rao. Particle swarm optimization approach for multi - objective composite box - beam design [ J ]. Composite Structures, 2007,81 (4) :598 - 605.
  • 6Heady, George.The Architecture of a Network Level Intrusion Detection System[R].Technical Report CS90-20, Department of Computer Science,University of New Mexico,1990.
  • 7Mukherjee,Heberlein.Network Intrusion Detection[J].IEEE Network, 1994;8(3) :26-41.
  • 8Kumar,Spafford.A Pattern Matching Model for Misuse Intrusion Detection[C].In:Proc of the 17th National Computer Security Conference, 1994:11-21.
  • 9Nuansri.A Process State-Transition Analysis and Its Application to Intrusion Detection[C].In:Proc of the 15th Annual Computer Security Application Conference, 1999.
  • 10Sinclair.An Application of Machine Learning to Network Intrusion Detection[C].In:Proceedings of the 15th Annum Computer Security Applications Conference, 1999.

共引文献104

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部