期刊文献+

基于信息共享的协同入侵检测模型研究 被引量:1

原文传递
导出
摘要 针对传统的IDS检测手段单一、误报率高的不足,研究如何在入侵检测中引入协作。提出了基于信息共享的协同入侵检测模型和算法。该模型独立于具体的系统,从而为通用的协同入侵检测系统提供了一个框架。协同入侵检测算法包括基于时间密度的抗噪声聚类算法和警报关联分析算法。在此基础上,实现了一个原型系统,并结合数据集测试方法对原型系统进行了测试,验证了模型和算法的可行性和有效性。
作者 丁晓阳 钱俊
出处 《计算机与信息技术》 2006年第7期48-53,共6页 Computer & Information Technology
  • 相关文献

参考文献8

  • 1D.Curry,and H.Debar.Intrusion Detection Message Exchange Format:Extensible Markup Language(XML)Document Type Definition[].draft-ietf-idwg-idmef-xml-txt+.2003
  • 2M.Ester,,H.P.Kriegel,J.Sander,,X.Xu.A density-based algorithm for discovering clusters in large spatial databases[].ProcofIntConfKnowledge Discovery and Data Mining.1996
  • 3V.Paxson.Bro:A System for Detecting Network Intruders in Real-Time[].Computer Networks.1999
  • 4M.Roesch.Snort:Lightweight intrusion detection for networks[].Procof LISA‘th Systems Administration Conference.1999
  • 5M.Mahoney,P.K.Chan.Learning Models of Network Traffic for Detecting Novel Attacks[].Florida Techtechnical report.2002
  • 6W.H.Joshua,P.L.Richard,J.F.David,T.Eushiuan,B.Steve,A.Z.Marc.1999DARPA Intrusion Detection System Evaluation:Design and Procedures[].TRMassachusetts USA:MIT Lincoln Laboratory.2001
  • 7K.Kendall.A Database of Computer Attacks for the Evaluation of Intrusion Detection System[]..1999
  • 8R.Lippmann,,J.Haines,D.Fried,et al.The 1999 DARPA off-line intrusion detection evaluation[].Computer Net-works.2000

同被引文献17

  • 1李涛.基于免疫的网络安全风险检测[J].中国科学(E辑),2005,35(8):798-816. 被引量:40
  • 2张攀勇,王达伟,曾宇,历军.专用捕包网络适配器的设计与实现[J].通信学报,2006,27(2):125-130. 被引量:6
  • 3刘欣然.一种新型网络攻击分类体系[J].通信学报,2006,27(2):160-167. 被引量:14
  • 4DASGUPTA D.Advances in artificial immune systems[J].IEEE Computational Intelligence,2006,1(4):40-49.
  • 5HOFMEYR S,FORREST S.Intrusion Detection:Architecture for an Artificial Immune System[J].Evolutionary Computation,2000,8(4):443-473.
  • 6BALACHANDRAN S,DASGUPTA D.A framework for evolving multi-shaped detectors in negative selection[A].Proceedings of the FOCI 2007[C].Honolulu,Hawaii,USA,2007.
  • 7KIM J,BENTLEY P.Toward an artificial immune system for net-work intrusion detection:an investigation of dynamic clonal selec-tion[A].Published in the proceedings of the special sessions on arti-ficial immune systems in Congress on Evolutionary Computation,IEEE World Congress on Computational Intelligence[C].Honolulu,Hawaii,2002.
  • 8AICKELIN U,GREENSMITH J,TWYCROSS J.Immune system approaches to intrusion detection – a review[A].Proc of the Third In-ternation Conference on Artificial Immune Systems (ICARIS-04)[C].2004.316-329.
  • 9DASGUPTA D,GONZALEZ F.Artificial Immune Systems in Intrusion Detection[M].Enhancing Computer Security with Smart Technology' (Editor V.Rao Vemuri),Auerbach Publications,2005.165-208.
  • 10SHAPIRO J M,LAMONT G B,PETERSON G L.An Evolutionary Algorithm to Generate Hyper-Ellipsoid Detectors for Negative Selec-tion[A].proceedings of the Genetic and Evolutionary Computation Conference[C].Washington,D.C.,2005.

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部