期刊文献+

特征提取技术中噪声过滤算法研究

Research on noise filtering algorithm in feature extraction technology
下载PDF
导出
摘要 网络攻击特征提取技术层出不穷,是当前网络信息安全问题研究的热点。分析了当前各种网络攻击特征提取技术,重点阐述了特征提取技术的理想步骤、当前发展状态以及存在的问题;在总结相关算法的基础上,提出了一种噪声过滤算法以优化特征的提取;通过深入分析和综合验证,证明此算法有一定的可行性及应用价值。 The network attack feature extraction techniques are various and develop quickly, It becomes a hot research topic. The current variety of feature extraction techniques is analyzed. The ideal step of feature extraction technology, the current development status and the exiting problems are mainly discussed. Based on having summarized relative algorithms, a new noise filtering algorithm to optimize feature extraction is introduced. The analysis result after comprehensive validation shows that the algorithm has certain feasibility and application value.
出处 《计算机时代》 2014年第4期43-44,46,共3页 Computer Era
基金 贵州省科技厅联合项目(黔科合J字LKT[2012]10) 铜仁市科技局计划项目(铜市科研(2013)9-12号)
关键词 网络攻击 特征提取 过滤 算法 network attacks feature extraction filtration algorithm
  • 相关文献

参考文献4

二级参考文献64

  • 1唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 2KABIRI P, GHORBANI A A. Research on intrusion detection and response: a survey[J]. International Journal of Network Security. 2005, 1(2): 84-102.
  • 3KREIBICH C, CROWCROFT J. Honeycomb-creating intrusion detection signatures using honeypots[A]. Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets Ⅱ)[C]. Boston: 2003. 51-56.
  • 4YEGNESWARAN V, GIFFIN J T, BARFORD P, et al. An architecture for generating semantics-aware signatures[A]. Proceedings of the 14th USENIX Security Symposium[C]. Baltimore, MD, USA, 2005. 97-112.
  • 5NEWSOME J, KARP B, SONG D. Polygraph: automatically generating signatures for polymorphic worms[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Washington, DC, USA, IEEE Computer Society, 2005.226-241.
  • 6KIM H A, KARP B. Autograph: toward automated, distributed worm signature detection[A]. Proceedings of USENIX Security Symposium[C]. 2004.271-286.
  • 7CRANDALL J R, WU S F, CHONG F T. Experiences using minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities[A]. Proceedings of GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)[C]. 2005.359-389.
  • 8CRANDALL J R, SU Z, WU S F, et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security[C]. New York, NY, USA, ACM Press,2005.235-248.
  • 9VARGIYA R, CHAN P. Boundary detection in tokenizing network application payload for anomaly detection[A]. Proceedings of ICDM Workshop on Data Mining for Computer Security(DMSEC)[C]. 2003.
  • 10WANG K, CRETU G, STOLFO S J. Anomalous payload-based worm detection and signature generation[A]. Proceedings of Recent Advances in Intrusion Detection (RAID)[C]. 2003.227-246.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部