期刊文献+

基于云模型的入侵检测方法 被引量:15

Intrusion Detection Using Cloud Model
下载PDF
导出
摘要 论文提出了一种基于云模型的入侵检测方法。该方法通过监控系统资源的使用情况(例如网络的流量、内存和CPU的使用情况),并对这些监控资源的原始数据进行处理,然后将处理后的数据输入到云决策器,云决策器根据设定的规则做出入侵决策。该方法能够检测系统级、网络级和用户级的入侵行为,模拟实验表明该方法有很强的检测能力和较好的鲁棒性。 In this paper we present a new method using cloud model.This method monitors various activities on system resource(such as flow of network,CPU and memory's using),and processes those raw data of system resource,then puts processed data to cloud decision generator which decides intrusion according to rules.This method can detect intrusion action on system level,network level and user level,simulation experiment indicates the method has very highly detec-tion ability and robust ability.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第26期158-160,164,共4页 Computer Engineering and Applications
基金 国家自然科学基金(编号:69975024)资助
关键词 入侵检测 云决策器 不确定性推理 规则发生器 Intrusion Detection,Cloud Decision Generator,Uncertainty Reasoning,Rule Generator
  • 相关文献

参考文献11

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1225
  • 2周宁.[D].通信工程学院,2000.
  • 3周宁.[D].通信工程学院,2000.
  • 4Frank J.Artificial Intelligence and Intrusion Detection:Current and future directions[C].In:Proceedings of the 17th National Computer Security Conference, 1994-10.
  • 5Helman P,Bhangoo J.A statistically base system for prioritizing information exploration under uncertainty[J].IEEE Transactions on Systems, Man and Cybernetics, Part A : Systems and Humans, 1997 ; 27 : 449-466.
  • 6Ghost A,Schwartzbard A.A study in using neural networks for an- omaly and misuse detection[C].In:Proceedings of the Eighth USENIX Security Symposium, 1999.
  • 7Crosbie M,Spafford E.Defending a computer system using autonomous agents[C].In:Proceedings of the 18th National Information Systems Security Conference, 1995-10.
  • 8Dipankar Dasgupta,Fabio A Gonzalez.An Intelligent Decision Support System for Intrusion Detection and Response.Lecture Notes in Computer Science, 2001.
  • 9JE Dickerson,JA Dickerson.Fuzzy Network Profiling for Intrusion Detection[C].In:Proc of Fuzzy Information Processing Society,2000.
  • 10Luo J,Bridges SM.Mining Fuzzy Association Rules and Fuzzy Fre- quency Episodes for Intrusion Detection[J].International Journal of Intelligent Systems,John Wiley & Sons,2000; 15:687-703.

二级参考文献5

  • 1李德毅.发现状态空间理论[J].小型微型计算机系统,1994,15(11):1-6. 被引量:25
  • 2李德毅,计算机智能接口与智能应用论文集,1993年
  • 3吴国富,实用数据分析方法,1992年
  • 4李中夫,模糊系统与数学,1987年,1卷,1期,1页
  • 5李德毅

共引文献1224

同被引文献186

引证文献15

二级引证文献409

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部