期刊文献+

基于条件随机场的协议异常检测

Protocol anomaly detection based on conditional random field
下载PDF
导出
摘要 提出了一种基于条件随机场的协议异常检测模型。该方法将连接中的数据包作为观测序列,量化数据包首部的标志位,计算标志位在连接中的出现频率作为观测序列的两个特征,实验结果验证了所建立模型的准确性,同基于隐马尔科夫模型的检测方法相比,提出的方法在各个衡量标准上都要高于后者。 This paper proposes a protocol anomaly detection model based on conditional random field(CRF). The method uses the data packet in the connection as the observation sequence, quantizes the flag of the packet header, and calculates the frequency of occurrence of the flag in the connection as two characteristics of the observation sequence. The experimental results verify the accuracy of the established model. Compared with the detection method based on Hidden Markov Model, the proposed method is higher than the latter in each measurement standard.
作者 赵静 谷鹏飞 何亚南 延霞 ZHAO Jing;GU Pengfei;HE Yanan;YAN Xia(School of Computer Sciences,Shenzhen Institute of Information Technology,Shenzhen,Guangdong 518172,P.R.China;State Key Laboratory of Nuclear Power Safety Monitoring Technology and Equipment,China Guangdong Nuclear Engineering Co.,Ltd.,Shenzhen,Guangdong 518000,P.R.China)
出处 《深圳信息职业技术学院学报》 2018年第2期50-55,共6页 Journal of Shenzhen Institute of Information Technology
基金 深圳信息职业技术学院横向课题(HX-173)
关键词 条件随机场 入侵检测 协议异常检测 conditional random fields intrusion detection protocol anomaly detection
  • 相关文献

参考文献3

二级参考文献31

  • 1李娜,秦拯,张大方,陈蜀宇.基于Markov Chain的协议异常检测模型[J].计算机科学,2004,31(10):66-68. 被引量:6
  • 2穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 3穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 4高磊,张德运,Md Jahangir Alam,张军,胡国栋.基于Petri网的TCP协议异常检测模型[J].西安交通大学学报,2006,40(6):659-662. 被引量:4
  • 5Balasubramaniyan J S,Garcia-Fernandez J O,Isacoff D,et al.An architecture for intrusion detection using autonomous agents[C]//Proc of the 14th Annual Computer Security Applications Conference.Los Alamitos,CA:IEEE Computer Society,1998:13-24.
  • 6Kumar D.Protocol anomaly detection for network-based intrusion detection[R/OL].GSEC Practical Assignment,Version 1.2f.(2001-08-13)[2008-10-23].http:///www.sans.org/reading_room/papers/? id=349.
  • 7Warrender C,Forrest S,Pearlmutter B.Detecting intrusions using system calls:alternative data models[C]//Proc of 1999 IEEE Symp on Security and Privacy.Piscataway,NJ:IEEE,1999:133-145.
  • 8Lemonnier E.Protocol Anomaly Detection in Network-based IDSs[EB/OL].Stockholm:Defcom.(2001-06-28)[2008-10-23].http://erwan.lemonnier.se/docs/protocol_anomaly_detection.pdf.
  • 9Beetle,Sasha.A strict anomaly detection model for IDS[J/OL].Phrack Magazine,2000,56(11).[2008-10-23].http://www.phrack.com/issues.html? issue=56&id=12.
  • 10Yoo I S.Protocol anomaly detection and verification[C]//Proc of the 2004 IEEE 5th Annual IEEE Workshop on Assurence and Security.Piscataway,NJ:IEEE,2004:74-81.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部