期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
一种基于状态树和拓扑分析的网络入侵预警系统
1
作者 徐邕江 《广西科学院学报》 2007年第3期184-187,共4页
在LINUX平台下,采用C/C++语言实现了基于状态树和基于拓扑分析的预警系统。该系统能够快速准确地对即将发生的入侵行为进行预警,为大规模网络系统的安全性提供一定保障。该系统框架具有良好的可靠性和扩展性,能够适应于分布式入侵检测... 在LINUX平台下,采用C/C++语言实现了基于状态树和基于拓扑分析的预警系统。该系统能够快速准确地对即将发生的入侵行为进行预警,为大规模网络系统的安全性提供一定保障。该系统框架具有良好的可靠性和扩展性,能够适应于分布式入侵检测预警的需要。 展开更多
关键词 入侵检测 入侵状态 拓扑分析 预警
下载PDF
应用部分马尔科夫博弈的网络安全主动响应决策模型 被引量:5
2
作者 胡鹤 胡昌振 姚淑萍 《西安交通大学学报》 EI CAS CSCD 北大核心 2011年第4期18-24,共7页
针对传统被动响应模型滞后于攻击且频繁误警和虚警导致不当响应的问题,提出一种基于部分马尔科夫博弈(POMG)的主动响应决策模型.该模型针对入侵过程生成入侵状态转换图,并根据攻击过程中得到的观察事件匹配入侵状态转换图,在考虑状态不... 针对传统被动响应模型滞后于攻击且频繁误警和虚警导致不当响应的问题,提出一种基于部分马尔科夫博弈(POMG)的主动响应决策模型.该模型针对入侵过程生成入侵状态转换图,并根据攻击过程中得到的观察事件匹配入侵状态转换图,在考虑状态不确定的情况下确定系统信念状态.将概率值超过信念状态阈值的状态作为初始节点生成入侵状态转换子图,根据子图的入侵过程确定攻防策略集,最终利用POMG算法选择最优主动响应策略.实验结果表明,基于POMG的主动响应模型较映射型模型响应速度快67%,平均响应效率高24.5%. 展开更多
关键词 主动响应 入侵状态转换图 部分马尔科夫博弈 信念状态
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
3
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
Status, Impact and Management of Certain Alien Plant Pests Proven to Be Invasive to Thailand's Ecology
4
作者 Malee Thungrabeab Suthap Tongma 《Journal of Life Sciences》 2011年第3期241-246,共6页
Introduction of foreign plants and animals into Thailand's ecology has a long history, some arrived accidentally and others had a purpose. As global commerce increases, the issue of invasive alien species has become ... Introduction of foreign plants and animals into Thailand's ecology has a long history, some arrived accidentally and others had a purpose. As global commerce increases, the issue of invasive alien species has become more urgent in Thailand. These agents are increasingly seen as a threat not only to biodiversity and ecosystem, but also to economic development and human well-being. They reduce yields of agricultural crops, forests and fisheries, decrease water availability, cause costly land degradation, block transport routes and contribute to the spread of disease. It is clear that since trade will not stop, dangerous alien species need to be controlled and managed and the strategies and control measures are to prevent, eradicate, contain, or effectively control the invaders. Implementation of these measures requires appropriate legislation, regulation and procedures. The impact of some invasive alien pests and their management on the agricultural sector of Thailand are presented. 展开更多
关键词 Invasive alien plant pest STATUS IMPACT MANAGEMENT Thailand.
下载PDF
Differences in functional traits among distinct populations of the plant invader Bunias orientalis 被引量:1
5
作者 Blaise Binama Caroline Müller 《Journal of Plant Ecology》 SCIE CSCD 2022年第3期524-537,共14页
Plants that expand their range and become invasive in other areas may shift several functional traits in response to specific environments.However,local conditions at the place of origin may have shaped the functional... Plants that expand their range and become invasive in other areas may shift several functional traits in response to specific environments.However,local conditions at the place of origin may have shaped the functional traits,which may to some extent remain visible in plants growing in new habitats.The present study aimed to explore the trait variation in different plant populations of native,invasive and naturalized status of Bunias orientalis grown in common conditions in relation to the climatic conditions at their place of origin.Seeds of B.orientalis were collected from 12 populations(4 per status)in 8 countries and grown under standardized conditions in a common field garden.The variation in several functional traits related to phenology,growth and reproduction was compared among status and among populations.Phenology did not differ according to status.However,several plants of the native populations,originating from areas with low annual temperatures,did not start flowering.Plants of the invasive populations produced more leaves than natives,potentially indicating their vigor in building up vegetative biomass.Number and mass of silicles and other growth traits did not differ among status groups but varied among populations.Some of the variation in functional traits may be explained by long-term adaptations to local conditions at the areas of origin and genetic diversity,while other environmental factors differing in the novel environment may contribute to a high trait variation. 展开更多
关键词 Bunias orientalis invasive species PHENOLOGY ecological status trait variation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部