期刊文献+

云环境下基于SOM神经网络的入侵检测方法研究 被引量:1

Research on Intrusion Detection Method Based on SOM Neural Network in Cloud Environment
下载PDF
导出
摘要 云安全已成为云计算发展过程中面临的重要挑战,基于云计算的入侵检测系统将成为云安全体系的重要组成部分。根据云计算特点和安全需求,设计了一种适合云环境的入侵检测系统模型,在入侵检测算法中引入SOM自组织特征映射神经网络算法,对SOM网络连接权值随机初始化可能导致的训练失败问题,采用基于模拟退火的微粒群算法对其进行优化,通过仿真实验验证优化算法可有效提高入侵检测性能。 Cloud security has become an important challenge in the development of cloud computing. The intrusion detection system based on cloud computing will be an important part of the cloud security system. According to the characteristics and security requirements of cloud computing, an intrusion detection system model is designed for the cloud environment, and the SOM self-organiz- ing feature map neural network algorithm is introduced into the intrusion detection algorithm. The random initialization of SOM network connection weights may lead to the failure of the training, so the particle swarm optimization algorithm based on simulated annealing is used to optimize the SOM neural network algorithm. The simulation experiment results show that the optimization algorithm can effectively improve the performance of intrusion detection.
作者 赵津 朱有产
出处 《计算机科学与应用》 2016年第8期505-513,共9页 Computer Science and Application
  • 相关文献

参考文献3

二级参考文献48

  • 1俞研,黄皓.一种半聚类的异常入侵检测算法[J].计算机应用,2006,26(7):1640-1642. 被引量:17
  • 2李洋.K-means聚类算法在入侵检测中的应用[J].计算机工程,2007,33(14):154-156. 被引量:23
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1070

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部