期刊文献+

一种基于分类树的误用检测规则分析机模型 被引量:2

A Model of Rule Analysis Machine Based on Classification Tree in Misuse Detection
下载PDF
导出
摘要 为了解决基于专家系统的入侵检测系统匹配速度慢,不能适应网络高带宽要求的问题,提出了一种图形化的模型,采用分类树的方法构建规则分析机模型,根据属性在攻击描述的作用,决定节点的选择顺序,并且在搜索过程中采用树的遍历算法代替产生式规则的字符串比较方法,从而有效减少误用检测系统的属性匹配时间,满足了实时性要求。 A graphical scheme is presented in order to resolve the problems that intrusion detection systems based on expert system slowly match the rules and cant keep up with high bandwidth of networks. The classification tree is used to build the rule analysis machine. The chosen sequence of the nodes is decided according to the effect the attributes in the attack description. The method of comparing characters of production rules is replaced with the traversing algorithm of trees. It effectively reduces the time of matching the attributes in the misuse detection systems, and meets the need of the real- time problem.
作者 关健 刘大昕
出处 《计算机工程》 CAS CSCD 北大核心 2004年第5期129-130,149,共3页 Computer Engineering
关键词 网络安全 入侵检测 分类树 模式匹配 Network security Intrusion detection Classification tree Pattern matching
  • 相关文献

参考文献6

  • 1[1]Richard H, George L, Authur M, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report CS90-20, Depar- tment of Computer Science, University of New Mexico, 1990-08
  • 2[2]Balasubramaniyan J S. An Architecture for Intrusion Detection Using Autonomous Agents. In: Proceedings of the 14th Annual Computer Security Application Conference,1998:86-91
  • 3[3]Kumar S. Classification and Detection of Computer Intrusion[Ph.D. Thesis]. Purdue University, 1995
  • 4[4]James C, James M. The Application of Artificial Neural Networks to Misuse Detection: Initial Results. In: Proceedings of the 1998 National Information Systems Security Conference (NISSC'98) Arlington, USA.http://csrc.nist.gov/nissc/1998/proceedings/paperF13. pdf, 1998-10
  • 5[5]Ghosh A K, Schwartzbard A. A Study in Using Neural Networks for Anomaly and Misuse Detection. In:Proceedings of the Eighth USENIX Security Symposium, Washington D.C. USA. http://www. usenix.org/events/sec99/ full_papers/ghosh/ghosh.pdf , 1999-08
  • 6[6]Teresa L, Jagannathan R, Lee R, et a1. IDES:The Enhanced Proto- type,a Real-time Intrusion Detection System. Technical report, Menlo Park, CA: SRI International, Computer Science Lab,1988:1-48

同被引文献24

  • 1尹朝庆,宋化,陈波.手写邮政编码的模糊识别方法[J].武汉理工大学学报(信息与管理工程版),2005,27(2):154-157. 被引量:4
  • 2范艳峰,肖乐,甄彤.自由手写体数字识别技术研究[J].计算机工程,2005,31(10):168-170. 被引量:8
  • 3管继斌,明德烈.基于游程的倾斜表格图像的快速检测和校正[J].华中科技大学学报(自然科学版),2005,33(8):69-71. 被引量:7
  • 4王国红,陈长兴.基于人工神经网络的智能识别数字模型[J].西安石油大学学报(自然科学版),2006,21(2):69-72. 被引量:5
  • 5张伟,王克俭,秦臻.基于神经网络的数字识别的研究[J].微电子学与计算机,2006,23(8):206-208. 被引量:23
  • 6RAFAEL C G, RICHARD E W. Digital image process- ing( 2 th ed) [M]. New Jersey: Prentice Hall, 2002.
  • 7ARICA N, YARMAN VURAI. F T. An overview of character recognition focused on off-line handwriting [J]. IEEE Transactions on Systems, Man, and Cyber- netics, Part C : Applications and Reviews, 2001, 31 ( 2 ) : 216 233.
  • 8PLAMANDON R, SRIHARI S N. On line and off-line handwriting recognition: a comprehensive survey[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000,22 ( 1 ) : 63-85.
  • 9ZHANG R, DING X. Offline handwritten numeralrecognition using orthogonal Gaussian mixture model[C]// IEEE International Conference on Image Processing. October 7-10, 2001, Thessaloniki, Greece. USA : IEEE Incorporated, 2001 : 1126-1129.
  • 10MADHVANATH S, GOVINDARAJU V. Reference lines for holistic recognition of handwritten words[J]. Pattern Reeognit, 1999,32(12) :2021-2028.

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部