期刊文献+

云计算的舰船网络入侵检测算法研究

Research on cloud computing algorithm for ship network intrusion detection
下载PDF
导出
摘要 普通入侵检测方法,不能在舰船保持运动状态情况下,准确判断入侵数据所处位置,并快速清除入侵数据。为解决此问题,搭建基于云计算环境的舰船网络入侵检测算法。通过数据捕捉模块的搭建、数据预处理模块的搭建,完成云计算运行环境的搭建。通过舰船网络总体结构的搭建、入侵检测算法的优化,完成算法的搭建。引入PSO法则,对算法的实现起到一定约束作用。设计对比实验结果表明,新型算法与普通方法相比,可以准确判断入侵数据所处位置,并大幅节省清除入侵数据所需时间。 The common intrusion detection method can not accurately determine the location of the intrusion data and quickly remove the intrusion data in the condition of the ship's movement state. In order to solve this problem, a ship network intrusion detection algorithm based on cloud computing environment is built. Through the construction of data capture module and data preprocessing module, the construction of cloud computing environment is completed. Through the construction of the overall structure of the ship network and the optimization of the intrusion detection algorithm, the construction of the algorithm is completed. The PSO rule is introduced, which plays a certain constraint on the implementation of the algorithm. The design comparison experiment results show that the new algorithm can accurately identify the location of the intrusion data and save time to eliminate the intrusion data compared with the common method.
作者 佟璐 梁海楠
出处 《舰船科学技术》 北大核心 2018年第3X期166-168,共3页 Ship Science and Technology
关键词 云计算 网络入侵 检测算法 数据捕获 数据预处理 cloud computing network intrusion detection algorithm data acquisition data preprocessing
  • 相关文献

参考文献4

二级参考文献30

  • 1吴迪,张亚平,郭禾.一种基于粗糙集理论和BP神经网络的入侵检测新方法[J].计算机研究与发展,2006,43(z2):437-441. 被引量:7
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 3陈友,沈华伟,李洋,程学旗.一种高效的面向轻量级入侵检测系统的特征选择算法[J].计算机学报,2007,30(8):1398-1408. 被引量:46
  • 4Modi C,Patel D,Borisaniya B.A survey of intrusion detection techniques in cloud[J].Journal of Network and Computer Applications,2013,36(1):42-57.
  • 5Ghosh A K,Michael C,Schatz M.A real-time intrusion system based on learning program behavior[C]//Proc of Recent Advances in Intrusion Detection.Berlin:Spinger-Verlag,2000:93-109.
  • 6Faraoun F M,Boukelif A.Neural networks learning improvement using the clustering algorithm to detect network intrusions[J].International Journal of Computational Intelligence,2007,3(2):161-168.
  • 7Richhariya V,Sharma N.Optimized intrusion detection by CACC discretization via Nave Bayes and clustering[J].International Journal of Computer Science & Network Security,2014,14(1):54-58.
  • 8Hassanzadeh A,Xu Zhaoyan,Stoleru R,et al.PRIDE:practical intrusion detection in resource constrained wireless Mesh networks[J].Information and Communications Security,2013,8233:213-228.
  • 9Brahmkstri K,Thomas D,Sawant S T,et al.Ontology based multiagent intrusion detection system for Web service attacks using self learning[J].Networks and Communications,2014,284:265-274.
  • 10Deng Zhaohong,Choi K S,Chung Fulai,et al.Enhanced soft subspace clustering integrating within-cluster and between-cluster information[J].Pattern Recognition,2010,43(3):767-781.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部