期刊文献+
共找到5,095篇文章
< 1 2 250 >
每页显示 20 50 100
Intrusion Detection System Using Classification Algorithms with Feature Selection Mechanism over Real-Time Data Traffic
1
作者 Gulab Sah Sweety Singh Subhasish Banerjee 《China Communications》 SCIE CSCD 2024年第9期292-320,共29页
The key objective of intrusion detection systems(IDS)is to protect the particular host or network by investigating and predicting the network traffic as an attack or normal.These IDS uses many methods of machine learn... The key objective of intrusion detection systems(IDS)is to protect the particular host or network by investigating and predicting the network traffic as an attack or normal.These IDS uses many methods of machine learning(ML)to learn from pastexperience attack i.e.signatures based and identify the new ones.Even though these methods are effective,but they have to suffer from large computational costs due to considering all the traffic features,together.Moreover,emerging technologies like the Internet of Things(Io T),big data,etc.are getting advanced day by day;as a result,network traffics are also increasing rapidly.Therefore,the issue of computational cost needs to be addressed properly.Thus,in this research,firstly,the ML methods have been used with the feature selection technique(FST)to reduce the number of features by picking out only the important ones from NSL-KDD,CICIDS2017,and CIC-DDo S2019datasets later that helped to build IDSs with lower cost but with the higher performance which would be appropriate for vast scale network.The experimental result demonstrated that the proposed model i.e.Decision tree(DT)with Recursive feature elimination(RFE)performs better than other classifiers with RFE in terms of accuracy,specificity,precision,sensitivity,F1-score,and G-means on the investigated datasets. 展开更多
关键词 CICids2017 dataset CLASSIFIERS ids ML NSL KDD dataset RFE
下载PDF
Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique
2
作者 Widad Elbakri Maheyzah Md.Siraj +2 位作者 Bander Ali Saleh Al-rimy Sultan Noman Qasem Tawfik Al-Hadhrami 《Computers, Materials & Continua》 SCIE EI 2024年第6期3725-3756,共32页
Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,de... Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,denial-of-service attacks,and evolving malware variants.Traditional security solutions often struggle with the dynamic nature of cloud environments,highlighting the need for robust Adaptive Cloud Intrusion Detection Systems(CIDS).Existing adaptive CIDS solutions,while offering improved detection capabilities,often face limitations such as reliance on approximations for change point detection,hindering their precision in identifying anomalies.This can lead to missed attacks or an abundance of false alarms,impacting overall security effectiveness.To address these challenges,we propose ACIDS(Adaptive Cloud Intrusion Detection System)-PELT.This novel Adaptive CIDS framework leverages the Pruned Exact Linear Time(PELT)algorithm and a Support Vector Machine(SVM)for enhanced accuracy and efficiency.ACIDS-PELT comprises four key components:(1)Feature Selection:Utilizing a hybrid harmony search algorithm and the symmetrical uncertainty filter(HSO-SU)to identify the most relevant features that effectively differentiate between normal and anomalous network traffic in the cloud environment.(2)Surveillance:Employing the PELT algorithm to detect change points within the network traffic data,enabling the identification of anomalies and potential security threats with improved precision compared to existing approaches.(3)Training Set:Labeled network traffic data forms the training set used to train the SVM classifier to distinguish between normal and anomalous behaviour patterns.(4)Testing Set:The testing set evaluates ACIDS-PELT’s performance by measuring its accuracy,precision,and recall in detecting security threats within the cloud environment.We evaluate the performance of ACIDS-PELT using the NSL-KDD benchmark dataset.The results demonstrate that ACIDS-PELT outperforms existing cloud intrusion detection techniques in terms of accuracy,precision,and recall.This superiority stems from ACIDS-PELT’s ability to overcome limitations associated with approximation and imprecision in change point detection while offering a more accurate and precise approach to detecting security threats in dynamic cloud environments. 展开更多
关键词 Adaptive cloud ids harmony search distributed denial of service(DDoS) PELT machine learning SVM ISOTCID NSL-KDD
下载PDF
CNN Channel Attention Intrusion Detection SystemUsing NSL-KDD Dataset
3
作者 Fatma S.Alrayes Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第6期4319-4347,共29页
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi... Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances. 展开更多
关键词 Intrusion detection system(ids) NSL-KDD dataset deep-learning MACHINE-LEARNING CNN channel Attention network security
下载PDF
Effective data transmission through energy-efficient clustering and Fuzzy-Based IDS routing approach in WSNs
4
作者 Saziya TABBASSUM Rajesh Kumar PATHAK 《虚拟现实与智能硬件(中英文)》 EI 2024年第1期1-16,共16页
Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,a... Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner. 展开更多
关键词 Low energy adaptive clustering hierarchy(LEACH) Intrusion detection system(ids) Wireless sensor network(WSN) Fuzzy logic and artificial neural network(ANN)
下载PDF
Probe Attack Detection Using an Improved Intrusion Detection System
5
作者 Abdulaziz Almazyad Laila Halman Alaa Alsaeed 《Computers, Materials & Continua》 SCIE EI 2023年第3期4769-4784,共16页
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business req... The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive features.Nevertheless,such benefits lead to a more adverse environment entailing network breakdown,systems paralysis,and online banking fraudulence and robbery.As one of the most common and dangerous threats in SDN,probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities,which is thenmanipulated to undermine the entire system.Precision,high performance,and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time,optimize prediction performance,and provide a holistic understanding of machine learning data.As the extension of astute machine learning algorithms into an Intrusion Detection System(IDS)through SDN has garnered much scholarly attention within the past decade,this study recommended an effective IDS under the Grey-wolf optimizer(GWO)and Light Gradient Boosting Machine(Light-GBM)classifier for probe attack identification.The InSDN dataset was employed to train and test the proposed IDS,which is deemed to be a novel benchmarking dataset in SDN.The proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within SDN.The results revealed that the proposed IDS outperforms the state-of-the-art IDSs,as it achieved 99.8%accuracy,99.7%recall,99.99%precision,and 99.8%F-measure. 展开更多
关键词 GWO ids InSDN LightGBM probe attack SDN
下载PDF
Fusion of Feature Ranking Methods for an Effective Intrusion Detection System
6
作者 Seshu Bhavani Mallampati Seetha Hari 《Computers, Materials & Continua》 SCIE EI 2023年第8期1721-1744,共24页
Expanding internet-connected services has increased cyberattacks,many of which have grave and disastrous repercussions.An Intrusion Detection System(IDS)plays an essential role in network security since it helps to pr... Expanding internet-connected services has increased cyberattacks,many of which have grave and disastrous repercussions.An Intrusion Detection System(IDS)plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks.Although extensive research was reported in IDS,detecting novel intrusions with optimal features and reducing false alarm rates are still challenging.Therefore,we developed a novel fusion-based feature importance method to reduce the high dimensional feature space,which helps to identify attacks accurately with less false alarm rate.Initially,to improve training data quality,various preprocessing techniques are utilized.The Adaptive Synthetic oversampling technique generates synthetic samples for minority classes.In the proposed fusion-based feature importance,we use different approaches from the filter,wrapper,and embedded methods like mutual information,random forest importance,permutation importance,Shapley Additive exPlanations(SHAP)-based feature importance,and statistical feature importance methods like the difference of mean and median and standard deviation to rank each feature according to its rank.Then by simple plurality voting,the most optimal features are retrieved.Then the optimal features are fed to various models like Extra Tree(ET),Logistic Regression(LR),Support vector Machine(SVM),Decision Tree(DT),and Extreme Gradient Boosting Machine(XGBM).Then the hyperparameters of classification models are tuned with Halving Random Search cross-validation to enhance the performance.The experiments were carried out on the original imbalanced data and balanced data.The outcomes demonstrate that the balanced data scenario knocked out the imbalanced data.Finally,the experimental analysis proved that our proposed fusionbased feature importance performed well with XGBM giving an accuracy of 99.86%,99.68%,and 92.4%,with 9,7 and 8 features by training time of 1.5,4.5 and 5.5 s on Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD),Canadian Institute for Cybersecurity(CIC-IDS 2017),and UNSW-NB15,datasets respectively.In addition,the suggested technique has been examined and contrasted with the state of art methods on three datasets. 展开更多
关键词 Cyber security feature ranking IMBALANCE PREPROCESSING ids SHAP
下载PDF
DL-Powered Anomaly Identification System for Enhanced IoT Data Security
7
作者 Manjur Kolhar Sultan Mesfer Aldossary 《Computers, Materials & Continua》 SCIE EI 2023年第12期2857-2879,共23页
In many commercial and public sectors,the Internet of Things(IoT)is deeply embedded.Cyber security threats aimed at compromising the security,reliability,or accessibility of data are a serious concern for the IoT.Due ... In many commercial and public sectors,the Internet of Things(IoT)is deeply embedded.Cyber security threats aimed at compromising the security,reliability,or accessibility of data are a serious concern for the IoT.Due to the collection of data from several IoT devices,the IoT presents unique challenges for detecting anomalous behavior.It is the responsibility of an Intrusion Detection System(IDS)to ensure the security of a network by reporting any suspicious activity.By identifying failed and successful attacks,IDS provides a more comprehensive security capability.A reliable and efficient anomaly detection system is essential for IoT-driven decision-making.Using deep learning-based anomaly detection,this study proposes an IoT anomaly detection system capable of identifying relevant characteristics in a controlled environment.These factors are used by the classifier to improve its ability to identify fraudulent IoT data.For efficient outlier detection,the author proposed a Convolutional Neural Network(CNN)with Long Short Term Memory(LSTM)based Attention Mechanism(ACNN-LSTM).As part of the ACNN-LSTM model,CNN units are deployed with an attention mechanism to avoid memory loss and gradient dispersion.Using the N-BaIoT and IoT-23 datasets,the model is verified.According to the N-BaIoT dataset,the overall accuracy is 99%,and precision,recall,and F1-score are also 0.99.In addition,the IoT-23 dataset shows a commendable accuracy of 99%.In terms of accuracy and recall,it scored 0.99,while the F1-score was 0.98.The LSTM model with attention achieved an accuracy of 95%,while the CNN model achieved an accuracy of 88%.According to the loss graph,attention-based models had lower loss values,indicating that they were more effective at detecting anomalies.In both the N-BaIoT and IoT-23 datasets,the receiver operating characteristic and area under the curve(ROC-AUC)graphs demonstrated exceptional accuracy of 99%to 100%for the Attention-based CNN and LSTM models.This indicates that these models are capable of making precise predictions. 展开更多
关键词 CNN IOT ids LSTM security threats
下载PDF
Intrusion Detection System Through Deep Learning in Routing MANET Networks
8
作者 Zainab Ali Abbood DoguÇagdaşAtilla Çagatay Aydin 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期269-281,共13页
Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For... Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in promi-nence.For reasons including node mobility,due to MANET’s potential to provide small-cost solutions for real-world contact challenges,decentralized management,and restricted bandwidth,MANETs are more vulnerable to security threats.When protecting MANETs from attack,encryption and authentication schemes have their limits.However,deep learning(DL)approaches in intrusion detection sys-tems(IDS)can adapt to the changing environment of MANETs and allow a sys-tem to make intrusion decisions while learning about its mobility in the environment.IDSs are a secondary defiance system for mobile ad-hoc networks vs.attacks since they monitor network traffic and report anything unusual.Recently,many scientists have employed deep neural networks(DNNs)to address intrusion detection concerns.This paper used MANET to recognize com-plex patterns by focusing on security standards through efficiency determination and identifying malicious nodes,and mitigating network attacks using the three algorithms presented Cascading Back Propagation Neural Network(CBPNN),Feedforward-Neural-Network(FNN),and Cascading-Back-Propagation-Neural-Network(CBPNN)(FFNN).In addition to Convolutional-Neural-Network(CNN),these primary forms of deep neural network(DNN)building designs are widely used to improve the performance of intrusion detection systems(IDS)and the use of IDS in conjunction with machine learning(ML).Further-more,machine learning(ML)techniques than their statistical and logical methods provide MANET network learning capabilities and encourage adaptation to differ-ent environments.Compared with another current model,The proposed model has better average receiving packet(ARP)and end-to-end(E2E)performance.The results have been obtained from CBP,FFNN and CNN 74%,82%and 85%,respectively,by the time(27,18,and 17 s). 展开更多
关键词 ARP CBPNN CNN DNN DL E2E FFNN ids ML MANET security
下载PDF
Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
9
作者 Salaheddine Kably Tajeddine Benbarrad +1 位作者 Nabih Alaoui Mounir Arioua 《Computers, Materials & Continua》 SCIE EI 2023年第1期253-278,共26页
Blockchain merges technology with the Internet of Things(IoT)for addressing security and privacy-related issues.However,conventional blockchain suffers from scalability issues due to its linear structure,which increas... Blockchain merges technology with the Internet of Things(IoT)for addressing security and privacy-related issues.However,conventional blockchain suffers from scalability issues due to its linear structure,which increases the storage overhead,and Intrusion detection performed was limited with attack severity,leading to performance degradation.To overcome these issues,we proposed MZWB(Multi-Zone-Wise Blockchain)model.Initially,all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm(EBA),considering several metrics.Then,the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph(B-DAG),which considers several metrics.The intrusion detection is performed based on two tiers.In the first tier,a Deep Convolution Neural Network(DCNN)analyzes the data packets by extracting packet flow features to classify the packets as normal,malicious,and suspicious.In the second tier,the suspicious packets are classified as normal or malicious using the Generative Adversarial Network(GAN).Finally,intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization(IMO)is used for attack path discovery by considering several metrics,and the Graph cut utilized algorithm for attack scenario reconstruction(ASR).UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator(NS-3.26).Compared with previous performance metrics such as energy consumption,storage overhead accuracy,response time,attack detection rate,precision,recall,and F-measure.The simulation result shows that the proposed MZWB method achieves high performance than existing works. 展开更多
关键词 IOT multi-zone-wise blockchain intrusion detection and prevention system edge computing network graph construction ids intrusion scenario reconstruction
下载PDF
A Comprehensive Analysis of Datasets for Automotive Intrusion Detection Systems
10
作者 Seyoung Lee Wonsuk Choi +2 位作者 InsupKim Ganggyu Lee Dong Hoon Lee 《Computers, Materials & Continua》 SCIE EI 2023年第9期3413-3442,共30页
Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the ... Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the datasets used for training and evaluation.Despite the availability of several datasets for automotive IDSs,there has been a lack of comprehensive analysis focusing on assessing these datasets.This paper aims to address the need for dataset assessment in the context of automotive IDSs.It proposes qualitative and quantitative metrics that are independent of specific automotive IDSs,to evaluate the quality of datasets.These metrics take into consideration various aspects such as dataset description,collection environment,and attack complexity.This paper evaluates eight commonly used datasets for automotive IDSs using the proposed metrics.The evaluation reveals biases in the datasets,particularly in terms of limited contexts and lack of diversity.Additionally,it highlights that the attacks in the datasets were mostly injected without considering normal behaviors,which poses challenges for training and evaluating machine learning-based IDSs.This paper emphasizes the importance of addressing the identified limitations in existing datasets to improve the performance and adaptability of automotive IDSs.The proposed metrics can serve as valuable guidelines for researchers and practitioners in selecting and constructing high-quality datasets for automotive security applications.Finally,this paper presents the requirements for high-quality datasets,including the need for representativeness,diversity,and balance. 展开更多
关键词 Controller area network(CAN) intrusion detection system(ids) automotive security machine learning(ML) DATASET
下载PDF
Classification Model for IDS Using Auto Cryptographic Denoising Technique
11
作者 N.Karthikeyan P.Sivaprakash S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期671-685,共15页
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization algorithms.These classifiers,on the other hand,do not work e... Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization algorithms.These classifiers,on the other hand,do not work effectively unless they are combined with additional algorithms that can alter the classifier’s parameters or select the optimal sub-set of features for the problem.Optimizers are used in tandem with classifiers to increase the stability and with efficiency of the classifiers in detecting invasion.These algorithms,on the other hand,have a number of limitations,particularly when used to detect new types of threats.In this paper,the NSL KDD dataset and KDD Cup 99 is used to find the performance of the proposed classifier model and compared;These two IDS dataset is preprocessed,then Auto Cryptographic Denoising(ACD)adopted to remove noise in the feature of the IDS dataset;the classifier algorithms,K-Means and Neural network classifies the dataset with adam optimizer.IDS classifier is evaluated by measuring performance measures like f-measure,recall,precision,detection rate and accuracy.The neural network obtained the highest classifying accuracy as 91.12%with drop-out function that shows the efficiency of the classifier model with drop-out function for KDD Cup99 dataset.Explaining their power and limitations in the proposed methodology that could be used in future works in the IDS area. 展开更多
关键词 Auto cryptographic denoising(ACD) classifier intrusion detection system(ids) OPTIMIZER performance measures
下载PDF
A Hybrid DNN-RBFNN Model for Intrusion Detection System
12
作者 Wafula Maurice Oboya Anthony Waititu Gichuhi Anthony Wanjoya 《Journal of Data Analysis and Information Processing》 2023年第4期371-387,共17页
Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural N... Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions. 展开更多
关键词 Dense Neural Network (DNN) Radial Basis Function Neural Network (RBFNN) Intrusion Detection system (ids) Denial of Service (DoS) Remote to Local (R2L) User-to-Root (U2R)
下载PDF
基于4C/ID模型的面向综合学习的实证研究
13
作者 郭芳侠 何琳 张红军 《物理与工程》 2024年第2期25-30,共6页
本研究旨在探讨两种教学方法:4C/ID(A Four-Component Instructional Design)模型与传统模式对物理专业大学生知识获取和学习迁移的影响。实验组使用4C/ID模型设计进行教学,而控制组则使用传统模式,评估学生的学业表现,包括知识获取与... 本研究旨在探讨两种教学方法:4C/ID(A Four-Component Instructional Design)模型与传统模式对物理专业大学生知识获取和学习迁移的影响。实验组使用4C/ID模型设计进行教学,而控制组则使用传统模式,评估学生的学业表现,包括知识获取与学习迁移,同时对学生的认知负荷及焦虑情绪进行调查。结果显示,实验组在知识获取和学习迁移的评价上均优于控制组,但认知负荷和焦虑情绪也高于控制组,最后对产生的原因和进一步优化进行探讨。 展开更多
关键词 4C/ID模型 综合学习 实证研究
下载PDF
相控阵用TR模块的健康管理
14
作者 赵鹏 王琰 《计量与测试技术》 2024年第4期82-84,共3页
为满足相控阵雷达收发模块(TR模块)全生命周期健康管理的需求,本文设计了一种新型健康管理方式。通过对TR模块故障检测需求进行详细分析,确定故障检测内容和响应方案,并提出设计方案、系统框图及具有针对性的检测电路。试验表明:该健康... 为满足相控阵雷达收发模块(TR模块)全生命周期健康管理的需求,本文设计了一种新型健康管理方式。通过对TR模块故障检测需求进行详细分析,确定故障检测内容和响应方案,并提出设计方案、系统框图及具有针对性的检测电路。试验表明:该健康管理方式的故障定位可覆盖TR模块的6种主要故障,满足TR模块健康管理需求,且设计的样机具有较高的工业应用价值。 展开更多
关键词 TR模块 健康管理 故障检测 检波 温度 电压 数模转换 ID查询
下载PDF
IDS入侵检测系统研究 被引量:33
15
作者 李镇江 戴英侠 陈越 《计算机工程》 CAS CSCD 北大核心 2001年第4期7-9,共3页
在分布式计算环境中,信息系统首先需要考虑的就是保护数据和资源免遭未授权的非法访问、操作,甚至恶意入侵和破坏,因此安全管理日益成为人们关注的焦点。在诸多的新兴技术中,IDS(入侵检测系统)以它新颖的思路和广阔的应用前景而... 在分布式计算环境中,信息系统首先需要考虑的就是保护数据和资源免遭未授权的非法访问、操作,甚至恶意入侵和破坏,因此安全管理日益成为人们关注的焦点。在诸多的新兴技术中,IDS(入侵检测系统)以它新颖的思路和广阔的应用前景而倍受青睐。介绍IDS的历史和现状,说明现有IDS的不足以及今后ID技术的发展趋势。 展开更多
关键词 入侵检测系统 ids 计算机网络 TCP/IP协议 网络安全 信息安全
下载PDF
急性髓系白血病患者骨髓中ID3/ID4基因的表达及其临床意义
16
作者 王芸 张婷娟 +3 位作者 赵琪 林江 钱军 周静东 《现代肿瘤医学》 CAS 2024年第21期4148-4153,共6页
目的:探索分化抑制因子3及分化抑制因子4(inhibitor of differentiation 3 and inhibitor of differentiation 4,ID3/ID4)两基因在急性髓系白血病(acute myeloid leukemia,AML)患者骨髓中的表达及其临床意义。方法:应用实时荧光定量PCR... 目的:探索分化抑制因子3及分化抑制因子4(inhibitor of differentiation 3 and inhibitor of differentiation 4,ID3/ID4)两基因在急性髓系白血病(acute myeloid leukemia,AML)患者骨髓中的表达及其临床意义。方法:应用实时荧光定量PCR的方法检测32例非恶性血液病(设对照组)及133例初诊AML患者骨髓单个核细胞中ID3/ID4转录本水平,通过分组分析两者表达的临床意义。结果:AML患者骨髓中ID3/ID4转录本水平较对照组均显著降低(P=0.001及0.002),并且两者之间表达存在轻度正相关(r=0.282,P=0.001)。接收者操作特征曲线分析揭示ID3/ID4转录本水平可作为辅助诊断AML的潜在分子标志(AUC=0.682,P=0.001及AUC=0.673,P=0.002)。通过分组分析发现ID3低表达组患者年龄略小于ID3高表达组患者(P=0.054),NRAS突变频率略低于ID3高表达组患者(P=0.053)。ID4低表达组患者白细胞计数略高于ID4高表达组患者(P=0.088),CEBPA突变频率略高于ID4高表达组患者(P=0.099)。此外,无论在全部患者还是非M3患者中,ID4低表达组病例经过诱导化疗后达完全缓解的概率略低于ID4高表达组病例(P=0.080及0.065)。生存分析发现AML患者及其亚组(非M3及正常核型)中ID3低表达与ID3高表达组患者总体生存相似(P>0.05),ID4低表达病例的总体生存略低于ID4高表达组病例(P=0.058),而在非M3及正常核型患者中存在显著统计学差异(P=0.014及0.002)。结论:ID3/ID4表达下调可能是AML中的常见分子事件,其中ID4表达可能为AML预后判断提供重要参考。 展开更多
关键词 急性髓系白血病 ID3 ID4 临床意义
下载PDF
一种改进的IDS异常检测模型 被引量:21
17
作者 孙宏伟 田新广 +1 位作者 李学春 张尔扬 《计算机学报》 EI CSCD 北大核心 2003年第11期1450-1455,共6页
基于机器学习的异常检测是目前IDS研究的一个重要方向 .该文对一种基于机器学习的用户行为异常检测模型进行了描述 ,在此基础上提出一种改进的检测模型 .该模型利用多种长度不同的shell命令序列表示用户行为模式 ,建立多个样本序列库来... 基于机器学习的异常检测是目前IDS研究的一个重要方向 .该文对一种基于机器学习的用户行为异常检测模型进行了描述 ,在此基础上提出一种改进的检测模型 .该模型利用多种长度不同的shell命令序列表示用户行为模式 ,建立多个样本序列库来描述合法用户的行为轮廓 ,并在检测中采用了以shell命令为单位进行相似度赋值的方法 .文中对两种模型的特点和性能做了对比分析 ,并介绍了利用UNIX用户shell命令数据进行的实验 .实验结果表明 ,在虚警概率相同的情况下改进的模型具有更高的检测概率 . 展开更多
关键词 ids 入侵检测系统 异常检测模型 计算机网络 网络安全 机器学习
下载PDF
中国人Ⅱ型MPS家系IDS基因的一种新突变的鉴定 被引量:6
18
作者 郭奕斌 潘宏达 +2 位作者 郭春苗 李咏梅 陈路明 《遗传》 CAS CSCD 北大核心 2009年第11期1101-1106,共6页
为了研究粘多糖贮积症Ⅱ型(MPSⅡ)患者发病的分子遗传学机制,以便为今后的产前基因诊断等创造必要的前提条件,文章先采用尿糖胺聚糖(GAGs)定性检测法对疑似MPSⅡ的先证者进行初诊,然后采用PCR、PCR产物直接测序法对先证者及其家系成员... 为了研究粘多糖贮积症Ⅱ型(MPSⅡ)患者发病的分子遗传学机制,以便为今后的产前基因诊断等创造必要的前提条件,文章先采用尿糖胺聚糖(GAGs)定性检测法对疑似MPSⅡ的先证者进行初诊,然后采用PCR、PCR产物直接测序法对先证者及其家系成员进行突变检测。在检出IDS基因c.876del2新突变后,对随机采集的120例正常对照和其他非II型MPS患者包括MPSⅠ,Ⅳ,Ⅵ三型的病人共15例的IDS基因exon6进行序列分析,同时采用不同物种突变点序列的保守性分析法,以及直接测定患儿及其家庭相关成员IDS酶活性的方法对该新突变进行致病性分析。结果显示:先证者尿检呈强阳性(GAGs+++);其IDS基因exon6编码区内存在c.876-877delTC新缺失突变,为半合子突变,而其母、其姐为杂合突变;正常对照和其他非II型MPS患者的IDS基因exon6的检测结果均未发现该突变;不同物种氨基酸序列的同源性比对显示:c.876-877delTC突变所在的位置即p.292-293的苯丙氨酸(F)谷氨酰胺(Q)高度保守;酶活性测定的结果显示:先证者的IDS酶活性仅为2.3nmol/4h/mL,大大低于正常值,而其父的为641.9nmol/4h/mL,其母的血浆酶活性为95.8nmol/4h/mL,其姐的为103.2nmol/4h/mL。说明所发现的c.876-877delTC缺失移码突变是一种新的病理性突变,是该MPSⅡ患儿发病的根本内因。 展开更多
关键词 粘多糖贮积症Ⅱ型 ids基因 新突变 序列分析 生物信息学
下载PDF
分布式IDS动态可信度反馈调整算法 被引量:8
19
作者 程新党 张新刚 +1 位作者 王保平 刘志都 《河南科技大学学报(自然科学版)》 CAS 北大核心 2010年第4期39-42,45,共5页
在分布式IDS与安全设备联动系统中,为了对各个IDS的性能进行区别对待,并能对IDS的可信度进行实时调整,设计了动态可信度反馈算法。该算法首先使用D-S证据理论得到各IDS报警信息的综合可信度,然后使用综合可信度对各个报警节点的可信度... 在分布式IDS与安全设备联动系统中,为了对各个IDS的性能进行区别对待,并能对IDS的可信度进行实时调整,设计了动态可信度反馈算法。该算法首先使用D-S证据理论得到各IDS报警信息的综合可信度,然后使用综合可信度对各个报警节点的可信度进行反馈调整,使可信度随着节点的报警行为而实时发生变化,经过一定时间的训练,节点的可信度将成为其性能的准确量化评价,这样聚合后报警将更加真实准确,在一定程度上消除了虚警引起的系统错误联动。 展开更多
关键词 分布式ids 动态可信度 联动 聚合
下载PDF
基于移动agent的分布式入侵检测系统MAIDS的设计与实现 被引量:5
20
作者 肖建华 张建忠 +1 位作者 江罡 吴功宜 《计算机工程与应用》 CSCD 北大核心 2003年第17期164-165,180,共3页
阐述了基于移动agent技术的分布式入侵检测系统MAIDS的设计与实现。该系统利用了当前正在广泛研究的移动agent技术,主要由控制服务器和受检测主机两部分组成,它可同时对主机和网络进行检测,并具有一定的智能性和灵活性,克服了传统IDS的... 阐述了基于移动agent技术的分布式入侵检测系统MAIDS的设计与实现。该系统利用了当前正在广泛研究的移动agent技术,主要由控制服务器和受检测主机两部分组成,它可同时对主机和网络进行检测,并具有一定的智能性和灵活性,克服了传统IDS的一些缺陷。 展开更多
关键词 MAids 入侵检测 ids 移动AGENT AGENT
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部