期刊文献+

基于系统调用的神经网络异常检测技术 被引量:9

A Neural Network Anormaly Intrusion Detection Technology Based on System Calls
下载PDF
导出
摘要 给出了一种基于程序行为的神经网络异常检测技术,通过使用ELMAN网络,利用了程序执行时的系统调用的周期重复特性,使该系统具有检测新型入侵攻击和具有较低虚警率的特点。 This paper presents an anomaly detection technique for profiling program. By using an Elman network for recognizing recurrent features in program execution traces, system is given the character of ability to detect novel intrusion and of low false positive.
出处 《计算机工程》 CAS CSCD 北大核心 2001年第9期105-106,155,共3页 Computer Engineering
关键词 入侵检测 异常检测 神经网络 防火墙 计算机网络 Intrusion detection Anormal detection Neural network System call ELMAN network
  • 相关文献

参考文献2

二级参考文献5

  • 1Puketza N,IEEE Software,1997年,14卷,5期,43页
  • 2Puketza N J,IEEE Transactionson Software Engineering,1996年,22卷,10期,719页
  • 3Chen S S,The 19th National Information Systems Security Conference,1996年
  • 4Fox K L,In Proceeding of13 th National Computer Security Conference,1990年
  • 5GB/T93 87.2 -1995 ,信息处理系统开放系统互连基本参考模型第 2部分 :安全体系结构 .

共引文献75

同被引文献67

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2曹元大,徐漫江.一种基于系统调用分析的入侵检测方法及其应用[J].计算机工程,2004,30(15):114-116. 被引量:1
  • 3王凤先,张岩,刘振鹏,王静红.基于系统调用的入侵检测规则的生成[J].计算机工程与应用,2005,41(3):75-76. 被引量:4
  • 4[2]Daponte P, Grimaldi D, Michaeli L. Neural Network and DSP Based Decoder for DTMF Signals[J]. IEEE ProeSci. Meas. Technol, 2000, 147 (1).
  • 5[5]Susan C.Lee, David V. Heinbuch. Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks[J]. IEEE Trans on SMC, 2001, 31 (4).
  • 6[6]Richard P. Lippmann, Robert K. Cunningham. Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks[J]. Computer Networks, 2000,34:597-603.
  • 7[1]Anderson J P. Computer Security Threat Monitoring and surveillance[R]. James P Anderson Co, Fort Washington,Pennsylvania, 1980
  • 8[2]Smaha S E. An intrusion detection system[A]//Orlando ed.Proceedings of the Aerospace Computer Security Applications Conference[C]. Washington. DC: IEEE Computer Society Press, 1998:37-44
  • 9[3]Dorothy E Denning. An intrusion-detection model[J]. IEEE transactions on Software Engineering, 1987,13(2):222-232
  • 10[4]Heady R, Luger G, Maccabe A, et al. The architecture of a network level intrusion detection system[R]. Department of Computer Science, University of New Mexico, 1990

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部