期刊文献+

一种基于粗糙集的网络攻击检测算法

A Rough Set Based on Network Attack Detection Algorithm
下载PDF
导出
摘要 当今网络的恶意攻击是多种多样的,众多的网络攻击手段日异月新。拒绝服务式攻击的攻击方法给网络资源造成了巨大的破坏,给网络用户留下了深刻的印象,因此如何防范来自网络的攻击是当前网络安全人员首要考虑的问题。现有的网络安全技术具有某些的智能性,随着计算机技术的发展,网络安全性技术的智能性也在逐步提高。事实上当发生拒绝服务攻击时,网络的流量就会变得异常。论文根据网络被攻击时流量变得异常时的特点,再结合粗糙集中的决策系统提出了一种新检测网络攻击方法。该方法具有一定智能性,机器具有智能性方面能够起到一定的补充作用。 Today network malicious attacks are various, the network attack means change everyday. Method of attack of denial of service attacks has caused great damage to the cyber source, leaving a deep impression to network users, so how to prevent from the network attack is the current network security personnel first consideration. Current network security technology has some intelligence, along with the development of computer technology, the intelligence of the network securi- ty technology has gradually improved. In fact, when the occurrence of the denial of service attacks, the flow of the network will become abnormal. According to the characteristics of network attacks when flows become abnormal, a new method of detecting network attacks combined with rough set decision system is put forward. The method has a certain intelligence, machine with intelligence can play a supplementary role.
作者 朱俚治
出处 《计算机与数字工程》 2015年第9期1630-1633,共4页 Computer & Digital Engineering
基金 北京航空航天大学软件开发环境国家重点实验室开放基金项目(编号:SKLSDE-2013KF)资助
关键词 粗糙集 DDOS攻击 流量 决策系统 决策树 rough set, DDoS attack, flow, decision system, decision tree
  • 相关文献

参考文献6

二级参考文献14

  • 1孙知信,唐益慰,程媛.基于改进CUSUM算法的路由器异常流量检测[J].软件学报,2005,16(12):2117-2123. 被引量:27
  • 2孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 3Steve R.W,Motion S.et a1.,Anatomy of a Commercial—Grade Immune System.IBM Research White Paper.1999.
  • 4William C.Learning Trees and Rules with SetValued Features.American Association for Artificial Intelligence(AAAI),1996.
  • 5MaRhew GZ,Eleazer E.et al.,Data Mining Methods for Detection of New Malicious Executables,IEEE Symposium on Security and Privacy,Oakland,CA,May 2001.
  • 6CERT Coordination Center. CERT Incident Note IN-99-07 Distributed Denial of Service Tools. http://www.cert.org/incident_notes/IN-99-07.html
  • 7CERT Coordination Center. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. http://www.cert .org/advisories/CA- 1996-21 .html
  • 8CERT Coordination Center. CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack. http://www.cert.org/advisories/CA- 1996-01 .html
  • 9Dave Dittrich. Distributed Denial of Service (DDoS) Attacks/tools.http://staff.washington.edu/dittrich/misc/ddos/
  • 10C. Jin, H. Wang and K. G. Shin. Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security, October 2003

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部