期刊文献+

大型舰船通信网络入侵检测方法研究 被引量:2

Research on intrusion detection method for large ship communication network
下载PDF
导出
摘要 针对传统的入侵检测方法一直存在入侵检测误差大、收敛性差的问题,提出基于惩罚函数和多元回归分析数学模型的大型舰船通信网络入侵检测方法,通过确定入侵节点区域面积计算舰船通信网络入侵节点聚集度,引入一个惩罚函数,再采用决策树分类法对舰船通信网络入侵节点进行分类。采用均方差作为标准测度函数,获取均方差之和,并通过构建多元回归分析数学模型,实现对大型舰船通信网络入侵的检测。实验结果对比可知,采用改进检测方法时,其检测误差及算法的收敛性,一直优于传统检测方法,具有一定的实用性。 According to the traditional intrusion detection methods have intrusion detection error and convergence problem, based on the penalty function and the multiple regression analysis of mathematical model of ship communication network intrusion detection, intrusion node by determining the area calculation of ship communication network intrusion node aggregation, introduce a penalty function, then using decision tree classification method of ship communication network intrusion node. The mean square error is used as the standard measure function to obtain the sum of the mean square error, and the mathematical model of multiple regression analysis is used to realize the detection of the communication network intrusion of large ships. The experimental results show that the improved detection method, the detection error and the convergence of the algorithm, has been better than the traditional detection method, has a certain practicality.
出处 《舰船科学技术》 北大核心 2017年第7X期100-102,共3页 Ship Science and Technology
关键词 舰船 通信网络 入侵检测 方法 数学模型 ship communication network intrusion detection method mathematical model
  • 相关文献

参考文献6

二级参考文献34

  • 1孔锐,张冰.一种快速支持向量机增量学习算法[J].控制与决策,2005,20(10):1129-1132. 被引量:31
  • 2叶明江,崔勇,徐恪,吴建平.基于有状态Bloom filter引擎的高速分组检测[J].软件学报,2007,18(1):117-126. 被引量:13
  • 3Bai Yuebin,Kobayashi H. Intrusion detection systems: teehnology and development[C]//Kawada S. Proeeedings of the 17th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2003 : 710-715.
  • 4Rroesch M. Snort-lightweight Intrusion detection for networks [C]//Ricketts S, Birdie C, Isaksson E. Proceedings of the 13th LISA Conference. Washington: USENIX, 1999: 229-238.
  • 5Brugger S T. Data mining methods for network intrusion detection[EB/OL].http://www-static.cc. gatech. edu/ -guofei/reading/brugger-dmnid.pdf, 2004.
  • 6Agrawal R, Srikant R. Fast algorithms for mining association rules [C]//Boeea J B, Jarke M, Zaniolo C. Proceed- ings of the 20th International Conference on Very Large Databases. San Francisco: Morgan Kaufmann Publishers Inc, 1994:487-499.
  • 7Rakesh A, Ramakrishnan S. Mining sequential patterns [C]//Yu P S, Chen ALP. Proceedings of the 11th International Conference on Data Engineering. Taipei: IEEE Computer Society, 1995: 3-14.
  • 8隋毅,杜跃进.NIDS的改进研究[J].计算机工程,2007,33(9):120-122. 被引量:6
  • 9Eskin E,Arnold A,Prerau M,et al A Geometric Framework for Unsupervised Anomaly Detection:Detecting Intrusions in Unlabeled Data To Appear in Data Mining for Security Applications,Kluwer,2002.
  • 10Lee W.A Data Mining Framework lbr Building Intrusion Detection Models IEEE Symposium on Security and Privacy,Berkeley,California,1999-05:120-132.

共引文献113

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部