期刊文献+

智能化入侵检测算法研究综述 被引量:4

Detection Algorithm for Intelligent Intrusion
下载PDF
导出
摘要 入侵检测作为网络安全的第二道闸门,在网络信息安全中具有重要的作用。智能化入侵检测算法能够发现入侵事件及其规律,已成为业界关注的焦点。首先,介绍了入侵检测的定义和入侵检测技术发展的重要事件;然后,在分别介绍各种智能算法的基础上,综述近十年来国内外相关研究成果,对各种智能算法在入侵检测系统中的优势和局限进行了总结分析;最后,结合入侵检测技术的发展情况,指出了该领域面临的挑战和未来的研究方向。 Intrusion detection, as the second gate of network security, plays an important role in network information security. Detection algorithm for intelligent intrusion could discover intrusion event and its reg- ularity, and thus attracts much attention from the industry. Firstly, the definition of intrusion detection and the most important events in the technical development are described, and then based on the respective in- troduction of different intelligent algorithms, the related research achievement, over the past decade are overviewed, the advantages and limitations of each intelligent algorithm in detection system also summa- rized and analyzed, and finally the remaining challenges and future trends in this area are pointed out in combination with the technical development of intrusion detection.
出处 《通信技术》 2015年第12期1321-1328,共8页 Communications Technology
基金 山东省科技发展计划项目(No.2014GGX101044)~~
关键词 入侵检测 机器学习 智能算法 技术集成 移动网络 IDS machine learning intelligent algorithms technology integration mobile network
  • 相关文献

参考文献36

  • 1刘远生辛一.计算机网络安全[M].北京:清华大学出版社2009.
  • 2LI W, XIANG D. Information-Theoretic Measures for A-nomaly Detection : Proceedings of the 2001 IEEE Sympo-sium on Security and Privacy[ C] . May, 2001:130-143.
  • 3卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 4Kumar S. Classification and Detection of Computer Intru-sions [D ]. Dissertation, Purdue University ,1995.
  • 5Lippman R, Haines J W, et al. Analysis and Results of the1999 DARPA Off-Line Intrusion Detection Evaluation : Pro-ceedings of the 3 rd International Workshop on Recent Ad-vances in Intrusion Detection[ C],2000: 162-182.
  • 6Dhurjati D, Bollineni P. A Fast Automaton - based Meth-od for Detecting Anomalous Program Behaviors : Proceed-ings of the 2001 IEEE Symposium on Security and Privacy[C]. Oakland,California. 2001 : 144-155.
  • 7Anderson J P. Computer Security Threat Monitoring andSurveillance[ R]. James P Anderson Co, Fort Washing-ton ,Pennsylvania, 1980.
  • 8Dorothy E. Denning. An Intrusion Detection Model[ J].IEEE transaction on software engineering, 1987,13(2):222-233.
  • 9CHEN S,TANG B, Schnackenberg D. The Common Intru-sion Detection Framework-Data Formats[R]. Internet DraftDraft-ietf-cidf-data-formats-00. txt,1998.
  • 10Murthy Y V S, Harish K, Varma D K V,et al. HybridIntelligent Intrusion Detection System using Bayesianand Genetic Algorithm ( BAGA ) : Comparitive Study[J ] ? International Journal of Computer Applications,2014,99(2) : 1-8.

二级参考文献146

共引文献376

同被引文献35

引证文献4

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部