期刊文献+

Unix进程中一种检测不规则入侵的自我定义 被引量:2

A DEFINE OF SELF FOR UNIX PROCESSES ABOUT ANOMALY INTRUSION
下载PDF
导出
摘要 在基于自然免疫系统的计算机安全方法中 ,本文提出了一种关于 U NIX进程的自我定义 ,可以用来区分正常行为与异常行为 。 Concerning of computer security methods based on natural immune system, we give a define of self for Unix processes. It can distinguish normal behavior and abnormal behavior for detecting anomaly intrusion.
出处 《小型微型计算机系统》 CSCD 北大核心 2001年第5期621-623,共3页 Journal of Chinese Computer Systems
关键词 UNIX 进程 不规则入侵 计算机安全 入侵检测 Anomaly intrusion detection Normal behavior Self UNIX process
  • 相关文献

参考文献2

  • 1陈向阳 方汉.Linux实用大全[M].北京:科学出版社,1999..
  • 2陈向阳,Linux 实用大全,1999年

共引文献19

同被引文献21

  • 1Cabrera J, Ravichandran B, Mehra R K. Statistical traffic modeling for network intrusion detection[A]. Proc IEEE Int Workshop Model Anal Simul Comput Telecommun Syst[C]. Washington. D. C.: IEEE Computer Society Press, 2000, 466-473.
  • 2Lindqvist U, Porras P A. Detecting computer and network misuse through the production-based expert system toolset (PBEST) [A]. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy[C]. Washington D. C.: IEEE Computer Society Press, 1999, 146-161.
  • 3Lee S C, Heinbuch D V. Training a neural-network based intrusion detector to recognize novel attacks[J]. IEEE Trans Syst Man Cybern PT a Syst Humans, 2001,31(4): 294-299.
  • 4Lee W, Stolfo S J, Mok K W. Adaptive intrusion detection&colon: a data mining approach[J]. Artificial Intelligence Review, 2000,14(6) :533-567.
  • 5Hofmeyr S A, Forrest S. Architecture for an artificial immune system[J]. Evolutionary Computation, 2000,8 (4): 443-473.
  • 6Hofmeyr S A, Forrest S. Immunity by design: an artificial immune system[A]. Proceedings of the Genetic and Evolu-tionary Computation Conference (GECCO)[C]. San Francisco: Morgan-Kaufmann, 1999, 1289-1296.
  • 7Balthrop J, Esponda F, Forrest S et al. Coverage and generalization in an artificial immune system[A]. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002)[C]. New York: Morgan Kaufmann, 2002,3-10.
  • 8Chao D L, Forrest S. Information immune systems[A]. Proceedings of the First International Conference on Artificial Immune Systems (ICARIS) [C]. 2002, 132-140.
  • 9Hofmeyr S A. An immunological model of distributed detection and its application to computer security[D]. Albuquenque: University of New Mexico, 1999.
  • 10Dasgupta D. Immunity-based intrusion detection system: a general framework. In: Proceedings of the 22nd National Information Systems Security Conference (NISSC), 1999[EB/OL].http:∥csrc. nist. gov/nissc/1999/proceeding/papers/p11. pdf.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部