期刊文献+

一种基于非单调逻辑理论的入侵检测系统 被引量:2

Intrusion Detection System Based on Non-Monotonic Logic Theory
下载PDF
导出
摘要 提出了用模糊默认理论改造传统的单调推理机制和响应引擎的方法 ,从而建立了基于人工智能的入侵检测系统 .实验结果表明 ,改进后的系统不仅能适应高速主干网络的实时入侵检测需要 ,而且灵敏性有很大的提高 ;由于采用了响应回卷技术和面向代价的动态响应政策 ,从而大幅度降低了入侵检测和响应的代价 . This paper applies fuzzy default theory to transform reasoning mechanism and automated response system of intrusion detection system(IDS), and sets up an intelligent IDS——FDL IDS. The experiment results show that FDL IDS increases the detection speed and sensitivity and decreases the cumulative cost as compared with traditional intrusion detection expert system.
作者 张剑 龚俭
出处 《计算机学报》 EI CSCD 北大核心 2003年第9期1060-1067,共8页 Chinese Journal of Computers
基金 国家自然科学基金 ( 90 10 40 3 1)资助
关键词 网络安全 入侵检测系统 非单调逻辑理论 防火墙 计算机网络 模糊默认理论 fuzzy default logic intrusion detection monotonic logic response rollback
  • 引文网络
  • 相关文献

参考文献4

  • 1Dickerson J E, Juslin J, Koukousoula O, Dickerson J A. Fuzzy intrusion detection. In: Proceedings of IFSA World Congress.and 20th NAFIPS International Conference, Vancouver, British Columbia, 2001. 1506-1510.
  • 2Siraj A, Bridges S M, Vaughn R B. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. In:Proceedings of IFSA World Congress and 20th NAFIPS International Conference, Vancouver, British Columbia, 2001..2165-170.
  • 3Geib C W, Goldman R P. Plan recognition in intrusion detection system. In.. Proceedings of DARPA Information Survivability Conference - Exposition II,Hilton Anaheim, California, 2001.46-55.
  • 4Lee Wenke, Fan Wei, Miller Matthew, Stolfo Sal, Zadok Erez.Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 2002, 10(1) : 318-336.

同被引文献25

  • 1苏开乐,吕关锋,陈清亮.基于知识结构的认证协议验证[J].中国科学(E辑),2005,35(4):337-351. 被引量:7
  • 2张燕,傅建明,孙晓梅.一种基于模型检查的入侵检测方法[J].武汉大学学报(理学版),2005,51(3):319-322. 被引量:4
  • 3Huang Mingyuh, Wicks T M. A Large Scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis[J] . Computer Networks , 1999,31(23-24) :2465-2475
  • 4Ilgun K, Kemmerer R, Porras P. State Transition Analysis : A Rule Based Intrusion Detection Approach[J]. IEEE Trans on Software Engineering ,1995,21(3) :181-199
  • 5K L McMillan.Symbolic Model Checking:An Approach to the State Explosion Problem[M].Kluwer Academic,1993:26
  • 6Mcmillan KL. Symbolic Model Checking: States and Beyond. Information and Computation, 1992,98(2):142-170
  • 7Holzmann G. Design and Validation of Computer Protocols. Prentice Hall, 1990:30
  • 8Holzmann G. The Model Checker Spin. IEEE Trans. on Software Engineering, 1997,23(5):279-295
  • 9Van Der Meyden R, Shilov NV. Model Checking Knowledge and Time in Systems with Perfect Recall (Extended Abstract). In: Proceeding of Foundations of Software Technology and Theoretical Computer Science (LNCS 1738). Berlin: Springer-Verlag, 1999:432-445
  • 10Van Der Hoek W, Wooldridge M. Model Checking Knowledge and Time. In: Proc. of the 9th Spin Workshop on Model Checking of Software. Berlin: Springer-Verlag, 2002:1-16

引证文献2

二级引证文献3

;
使用帮助 返回顶部