期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
EARLY WARNING MODEL OF NETWORK INTRUSION BASED ON D-S EVIDENCE THEORY 被引量:1
1
作者 TianJunfeng ZhaiJianqiang DuRuizhong HuangJiancai 《Journal of Electronics(China)》 2005年第3期261-267,共7页
Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectivel... Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly. 展开更多
关键词 侵入窃密检测 预警 数据融合 D-S证据理论 网络安全
下载PDF
Decision Cost Feature Weighting and Its Application in Intrusion Detection
2
作者 QIANQuan GENGHuan-tong WANGXu-fa 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期765-769,共5页
This paper introduces the cost-sensitive feature weighting strategy and its application in intrusion detection. Cost factors and cost matrix are proposed to demonstrate the misclassification cost for IDS. How to get t... This paper introduces the cost-sensitive feature weighting strategy and its application in intrusion detection. Cost factors and cost matrix are proposed to demonstrate the misclassification cost for IDS. How to get the whole minimal risk, is mainly discussed in this paper in detail. From experiments, it shows that although decision cost based weight learning exists somewhat attack misclassification, it can achieve relatively low misclassification costs on the basis of keeping relatively high rate of recognition precision. 展开更多
关键词 决策成本 特征加权 侵入窃密检测 网络攻击 识别精度
下载PDF
霍尼韦尔获得USAF最高安全认证
3
《A&S(安全&自动化)》 2008年第1期32-32,共1页
霍尼韦尔宣布,其Vindicator(R)安全解决方案已从美国空军获得最高安全认证.即PL-1认证。 这项认证确认Vindicator Command&Control(VCC)平台,V5侵入窃密检测系统(IDS)和V5访问控制系统(ACS)可以作为适用于侵入窃密检测和入... 霍尼韦尔宣布,其Vindicator(R)安全解决方案已从美国空军获得最高安全认证.即PL-1认证。 这项认证确认Vindicator Command&Control(VCC)平台,V5侵入窃密检测系统(IDS)和V5访问控制系统(ACS)可以作为适用于侵入窃密检测和入口控制系统的经核准的命令控制与显示解决方案。 展开更多
关键词 安全认证 USAF 侵入窃密检测 访问控制系统 COMMAND 安全解决方案 美国空军 命令控制
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部