期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
基于改进白名单过滤的跨网入侵检测仿真 被引量:2
1
作者 刘洋 《计算机仿真》 北大核心 2020年第1期385-389,共5页
为了有效提升传统入侵检测方法的检测效率,提出基于改进白名单过滤的跨网入侵检测方法。首先,组建有效的数据存储结构,设定相应的白名单规则及配置对报文数据进行初次过滤;然后,采用神经网络对白名单规则进行完善,将训练学习结果输入到... 为了有效提升传统入侵检测方法的检测效率,提出基于改进白名单过滤的跨网入侵检测方法。首先,组建有效的数据存储结构,设定相应的白名单规则及配置对报文数据进行初次过滤;然后,采用神经网络对白名单规则进行完善,将训练学习结果输入到过滤器中,二次过滤不符合白名单规则的报文数据;提高跨网异常通信检测率。最后,以粒子群优化算法为基础,引入自适应变异过程优化BP神经网络训练参数,避免BP神经网络训练学习结果陷入局部最优,保证检测结果的有效性。实验结果表明,与传统方法相比,所提方法的检测效率有很大程度的提升。 展开更多
关键词 改进白名单 过滤 网入侵检测
下载PDF
联想网御入侵检测系统通过评测
2
作者 吕莉 《有线电视技术》 2004年第15期28-28,共1页
关键词 联想集团 入侵检测系统 产品评测 络安全
下载PDF
“东方网警”入侵检测系统简介
3
《计算机安全》 2003年第31期36-36,共1页
关键词 “东方警”入侵检测系统 防火墙 检测 络安全 计算机
下载PDF
基于扩展命题区间时序逻辑的免疫网络攻击检测模型
4
作者 陈茜月 庞建民 《信息工程大学学报》 2020年第1期43-48,共6页
在攻击建模领域,基于逻辑的建模方法具有独特的优势和研究价值,能够有效检测复杂的网络攻击。以往研究[1]在建模和逻辑描述方面存在一定局限性,许多攻击无法检测。因此,使用扩展命题间隔时间逻辑(Extended Propositional Interval Tempo... 在攻击建模领域,基于逻辑的建模方法具有独特的优势和研究价值,能够有效检测复杂的网络攻击。以往研究[1]在建模和逻辑描述方面存在一定局限性,许多攻击无法检测。因此,使用扩展命题间隔时间逻辑(Extended Propositional Interval Temporal Logic,EPITL)来描述攻击。首先分析各类攻击的原理;其次,将每次攻击的具体细节转化为原子操作,给出原子命题集合;最后,对每个攻击行为使用EPITL描述,构建该攻击的EPITL公式,作为人工免疫攻击检测模型的输入,用于检测是否发生攻击行为。 展开更多
关键词 网入侵检测 模型检测 扩展命题区间时序逻辑
下载PDF
Intrusion detection model based on deep belief nets 被引量:6
5
作者 高妮 高岭 +2 位作者 贺毅岳 高全力 任杰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第3期339-346,共8页
This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detec... This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detection,and the principles regarding DBN are discussed.The DBN is composed of a multiple unsupervised restricted Boltzmann machine (RBM) and a supervised back propagation (BP)network.First,the DBN in the proposed model is pre-trained in a fast and greedy way,and each RBM is trained by the contrastive divergence algorithm.Secondly,the whole network is fine-tuned by the supervised BP algorithm,which is employed for classifying the low-dimensional features of the intrusion data generated by the last RBM layer simultaneously.The experimental results on the KDD CUP 1999 dataset demonstrate that the DBN using the RBM network with three or more layers outperforms the self-organizing maps (SOM)and neural network (NN)in intrusion classification.Therefore,the DBN is an efficient approach for intrusion detection in high-dimensional space. 展开更多
关键词 intrusion detection deep belief nets restricted Boltzmann machine deep learning
下载PDF
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
6
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
下载PDF
新品发布
7
《通信世界》 2002年第24期66-66,共1页
关键词 福光电子公司 FZY-120数字式杂音计 金诺安公司 网入侵检测产品 先杰无线公司 消息平台
下载PDF
Intrusion Detection for Wireless Mesh Networks using Finite State Machine 被引量:5
8
作者 Yi Ping Wu Yue +1 位作者 Liu Ning Wang Zhiyang 《China Communications》 SCIE CSCD 2010年第5期40-48,共9页
Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protec... Wireless Mesh Networks is vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, Lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer suffi- cient and effective for those features. In this paper, we propose a distributed intrusion detection ap- proach based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we con- struct the Finite State Machine (FSM) by the way of manually abstracting the correct behaviors of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behavior by the Finite State Ma- chine (FSM), and validly detect real-time attacks without signatures of intrusion or trained data.Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluate the intrusion detection method through simulation experiments. 展开更多
关键词 wireless mesh networks SECURITY intrusion detection finite state machine
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
9
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
Real-valued multi-area self set optimization in immunity-based network intrusion detection system 被引量:1
10
作者 Zhang Fengbin Xi Liang Wang Shengwen 《High Technology Letters》 EI CAS 2012年第1期1-6,共6页
The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may hav... The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may have the problem of boundary holes between self and nonself regions, and the generation efficiency is low, so that, the self set needs to be optimized before generation stage. This paper proposes a self set optimization algorithm which uses the modified clustering algorithm and Gaussian distribution theory. The clustering deals with multi-area and the Gaussian distribution deals with the overlapping. The algorithm was tested by Iris data and real network data, and the results show that the optimized self set can solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system's detection rate. 展开更多
关键词 immunity-based network intrusion detection system (NIDS) real-valued self set OPTIMIZATION
下载PDF
Study on Network Security Architecture for Power Systems 被引量:2
11
作者 Chen Yan Li Zengzhi Liao Zhigang 《Electricity》 2005年第3期47-49,共3页
The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which ... The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality. 展开更多
关键词 network security power system IDS FIREWALL
下载PDF
A NOVEL INTRUSION DETECTION MODE BASED ON UNDERSTANDABLE NEURAL NETWORK TREES 被引量:1
12
作者 Xu Qinzhen Yang Luxi +1 位作者 Zhao Qiangfu He Zhenya 《Journal of Electronics(China)》 2006年第4期574-579,共6页
Several data mining techniques such as Hidden Markov Model (HMM), artificial neural network, statistical techniques and expert systems are used to model network packets in the field of intrusion detection. In this pap... Several data mining techniques such as Hidden Markov Model (HMM), artificial neural network, statistical techniques and expert systems are used to model network packets in the field of intrusion detection. In this paper a novel intrusion detection mode based on understandable Neural Network Tree (NNTree) is pre-sented. NNTree is a modular neural network with the overall structure being a Decision Tree (DT), and each non-terminal node being an Expert Neural Network (ENN). One crucial advantage of using NNTrees is that they keep the non-symbolic model ENN’s capability of learning in changing environments. Another potential advantage of using NNTrees is that they are actually “gray boxes” as they can be interpreted easily if the num-ber of inputs for each ENN is limited. We showed through experiments that the trained NNTree achieved a simple ENN at each non-terminal node as well as a satisfying recognition rate of the network packets dataset. We also compared the performance with that of a three-layer backpropagation neural network. Experimental results indicated that the NNTree based intrusion detection model achieved better performance than the neural network based intrusion detection model. 展开更多
关键词 Intrusion detection Neural Network Tree (NNTree) Expert Neural Network (ENN) Decision Tree (DT) Self-organized feature learning
下载PDF
An immunity-based technique to detect network intrusions
13
作者 潘峰 丁云飞 汪为农 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期371-377,共7页
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune... This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results. 展开更多
关键词 Artificial immune system Network intrusion detection Negative selection Clonal selection
下载PDF
Behavior analysis of malicious sensor nodes based on optimal response dynamics
14
作者 GONG Junhui HU Xiaohui HONG Peng 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第1期96-104,共9页
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc... Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems. 展开更多
关键词 wireless sensor network intrusion detection malicious node evolutionary game optimal response dynamics
下载PDF
Anomaly-based model for detecting HTTP-tunnel traffic using network behavior analysis 被引量:3
15
作者 李世淙 Yun Xiaochun Zhang Yongzheng 《High Technology Letters》 EI CAS 2014年第1期63-69,共7页
Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the securi... Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators, they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users' private information. This paper focuses on a network behavior-based method to address the limitations of the existing protection systems. At first, it analyzes the normal network behavior pattern over HTI'P traffic and select four features. Then, it pres- ents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism. It also uses real-world data to validate that the selected features are useful. The experiments have demonstrated that the model could achieve over 93% hit-rate with only about 3% false- positive rate. It is regarded confidently that the approach is a complementary technique to the existing security systems. 展开更多
关键词 network security anomaly detection model hierarchical clustering HTFP-tunnel
下载PDF
Personalized Trust Management for Open and Flat P2P Communities
16
作者 左敏 李建华 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期527-532,共6页
A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trus... A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload. 展开更多
关键词 P2P trust management DHT collaborative filtering
下载PDF
Research on the Network Intrusion Detection System based on Modified Particle Swarm Optimization Algorithm
17
作者 XuesongWang Guangzhan Feng 《International Journal of Technology Management》 2016年第1期56-58,共3页
In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the sy... In this paper, we conduct research on the network intrusion detection system based on the modified particle swarm optimization algorithm. Computer interconnection ability put forward the higher requirements for the system reliability design, the need to ensure that the system can support various communication protocols to guarantee the reliability and security of the network. At the same time also require network system, the server or products have strong ability of fault tolerance and redundancy, better meet the needs of users, to ensure the safety of the information data and the good operation of the network system. For this target, we propose the novel paradigm for the enhancement of the modern computer network that is innovative. 展开更多
关键词 Intrusion Detection NETWORK Particle Swarm Optimization MODIFICATION Algorithm.
下载PDF
Application of detecting algorithm based on network
18
作者 张凤斌 杨永田 +1 位作者 江子扬 孙冰心 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期275-280,共6页
Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithm... Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively. 展开更多
关键词 network security intrusion detection ANOMALY
下载PDF
Decision Cost Feature Weighting and Its Application in Intrusion Detection
19
作者 QIANQuan GENGHuan-tong WANGXu-fa 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期765-769,共5页
This paper introduces the cost-sensitive feature weighting strategy and its application in intrusion detection. Cost factors and cost matrix are proposed to demonstrate the misclassification cost for IDS. How to get t... This paper introduces the cost-sensitive feature weighting strategy and its application in intrusion detection. Cost factors and cost matrix are proposed to demonstrate the misclassification cost for IDS. How to get the whole minimal risk, is mainly discussed in this paper in detail. From experiments, it shows that although decision cost based weight learning exists somewhat attack misclassification, it can achieve relatively low misclassification costs on the basis of keeping relatively high rate of recognition precision. Key words decision cost - feature weighting - intrusion detection CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation Key Research Plan of China (90104030) and “20 Century Education Development Plan”Biography: QIAN Quan(1972-), male, Ph. D. research direction: computer network, network security and artificial intelligence 展开更多
关键词 decision cost feature weighting intrusion detection
下载PDF
ANOMALY INTRUSION DETECTION METHOD USING FOURIER TRANSFORM
20
作者 YueBing ZhaoYuexia +2 位作者 XuZhoujun FuHongjuan MaFengning 《Journal of Electronics(China)》 2004年第2期135-139,共5页
A set of discrete points obtained from audit records on a behavior session is processed with Fourier transform. The criterion of selecting Fourier transform coefficients is introduced, and is used to find a unified va... A set of discrete points obtained from audit records on a behavior session is processed with Fourier transform. The criterion of selecting Fourier transform coefficients is introduced, and is used to find a unified value from the set of coefficients. This unified value is compared with a threshold to determine whether the session is abnormal. Finally simple test results are reported. 展开更多
关键词 Intrusion detection SESSION Fourier transform
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部