期刊文献+

多组件协作式网络安全入侵检测系统设计 被引量:6

Design of multi-component cooperative network security detection system against intrusion
下载PDF
导出
摘要 为了提高网络安全性能,提出基于多组件协作式检测的网络入侵安全检测系统设计方法。构建网络入侵的信号模型,对信号采用自适应匹配滤波器进行入侵特征检测,采用多组件协作级联滤波方法进行入侵信息过滤,实现入侵检测算法设计,在Matlab 7仿真软件中进行入侵检测系统的软件开发设计。采用硬件抽象组件、综合硬件组件和高层软件组件混合开发方法,实现多组件协作检测。测试结果表明,采用该方法进行网络安全入侵检测,具有较高的准确检测概率,提高了网络安全防护能力。 In order to improve the network security,a design method of network intrusion detection system based on multicomponent cooperative security detection is proposed in this paper.The signal model of network intrusion is constructed.The adaptive matching filter is used to detect the intrusion signal characteristic.The multi-component coordination cascade filtering method for intrusion information filtering is adopted to realize intrusion detection algorithm design.The software development and design of the intrusion detection system are carried out in the Matlab 7 simulation software.A mixed development method of the hardware abstraction component,integrated hardware component and high-level software component is used to implement multicomponent cooperative detection.The test results show that the method has high-accuracy detection probability for network security intrusion detection,and can improve the network security protective capability.
出处 《现代电子技术》 北大核心 2017年第22期66-68,共3页 Modern Electronics Technique
基金 国家自然科学基金(61402206)
关键词 多组件协作 网络安全 入侵检测 MATLAB multi-component cooperation network security intrusion detection Matlab
  • 相关文献

参考文献5

二级参考文献22

  • 1周贤伟,王培,覃伯平,申吉红.一种无线传感器网络异常检测技术研究[J].传感技术学报,2007,20(8):1870-1874. 被引量:13
  • 2薛安荣,鞠时光,何伟华,陈伟鹤.局部离群点挖掘算法研究[J].计算机学报,2007,30(8):1455-1463. 被引量:96
  • 3Zhu D, Guo J, Cho C, et al. Wireless mobile sensor network for the system identification of a space frame bridge E J ]. IEEE,/ASME Transactions on Mechatronics, 2012,17 ( 3 ) : 499 - 507.
  • 4Ehsan S,Bradford K,Brugger M,et al. Design and analysis of delay-tolerant sensor networks for monitoring and track- ing free-roaming animals E J ~. IEEE Transactions on Wire- less Communications ,2012,11 ( 3 ) : 1220 - 1227.
  • 5Rasheed A, Mahapatra R N. The three-tier security scheme in wireless sensor networks with mobile sinks [ J ]. IEEE Transactions on Parallel and Distributed Systems,2012,23 (5) :958 - 965.
  • 6Agrawal D P, Xie B. Encyclopedia on Ad Hoc and Ubiqui- tous Computing:Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks I M 1. World Scientific Publish- ing Co Inc,2009.
  • 7Song Y, Jiang G P. Model and dynamic behavior of mal- ware propagation over wireless sensor networksE A]. Com- plex Sciences I M ]. Berlin Heidelberg: Springer, 2009.487 - 502.
  • 8Khouzani M H R, Sarkar S. Maximum damage battery de- pletion attack in mobile sensor networksE J]. IEEE Transac- tions on Automatic Control ,201 l, 56 (10) :2358 - 2368.
  • 9Karyotis V. Markov random fields for malware propaga- tion : the case of chain networks I J ]. IEEE Communications Letters ,2010,14(9) : 875 - 877.
  • 10Song Y, Jiang G P. Modeling malware propagation in wire- less sensor networks using cellular automata ~ A ]. 2008 In- ternational Conference on Neural Networks and Signal Pro- cessing I C ~. IEEE,2008. 623 - 627.

共引文献77

同被引文献47

引证文献6

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部