期刊文献+

异常检测技术在移动设备及网络安全防护中的应用 被引量:1

Application of anomaly detection in mobile devices and in the protection of network security
下载PDF
导出
摘要 网络安全就是采取一定的手段对网络系统进行保护,避免用户系统内部的硬件、软件以及数据遭到他人的损坏、修改或者泄露,从而保障系统运行的安全性和可靠性。在移动设备和网络的安全防护中,由于恶意软件更新速度较快、移动网络本身稳定性较差,使得异常检测得到了广泛的应用和研究。文中探讨了异常检测技术在移动设备及网络安全防护中的应用,以期为网络安全相关研究提供借鉴意义。 Network security is to take certain means of network protection, prevent users from within the system hardware,software, and data corrupted others, modification or disclosure, in order to protect the security of system operation and reliability. In the mobile device and network security, since the malware updates faster, less stable mobile network itself, so that the abnormality detection has been widely used and studied. The article discusses the anomaly detection technology in mobile devices and network security in order to provide reference for the network security-related research.
作者 张庆
出处 《电子设计工程》 2014年第20期55-57,共3页 Electronic Design Engineering
关键词 异常检测 移动设备 网络 防护 anomaly detection mobile equipment network protect
  • 相关文献

参考文献11

二级参考文献68

  • 1牛莉,毕雅军.关于最小置信区间的讨论[J].东北林业大学学报,2004,32(6):106-107. 被引量:2
  • 2曾鹏,梁韡,王军,于海斌.一种基于生物免疫原理的无线传感器网络安全体系[J].小型微型计算机系统,2005,26(11):1907-1910. 被引量:10
  • 3俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 4Gao D, Reiter K M, Song D. On gray-box program tracking for anomaly detection. In: Proceedings of the 13th USENIX Security Symposium, San Diego, August 2004
  • 5Gao D, Reiter K M, Song D. Gray-box extraction of execution graphs for anomaly detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 2004
  • 6Forrest S, Hofmeyr S A, Somayaji A, et al. A sense of serf for unix processes. In: IEEE Symposium on Computer Security and Privacy, Los Alamos, CA, May 1996
  • 7Forrest S, Hofmeyr S A, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1995(6): 151-180
  • 8Helman P, Bhangoo J. A statistically based system forprioritizing information exploration under uncertainty. IEEE Transactions on Systems, 1997(7): 449-466
  • 9Lee W, Stolfo S J, Chan P K. Learning patterns from Unix process execution traces for intrusion detection. AAAI Workshop on A1 Approaches to Fraud Detection and Risk Management, July 1997
  • 10Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: IEEE Symposium on Security and Privacy, 1999

共引文献53

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部