期刊文献+
共找到237篇文章
< 1 2 12 >
每页显示 20 50 100
Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure
1
作者 Mohammad Hafiz Mohd Yusof Abdullah Mohd Zin Nurhizam Safie Mohd Satar 《Computers, Materials & Continua》 SCIE EI 2022年第8期2445-2466,共22页
Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks.On the other hand,state-of-the-art methods like deep learning re... Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks.On the other hand,state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model.This is unlikely to be the case in production network as the dataset is unstructured and has no label.Hence an unsupervised learning is recommended.Behavioral study is one of the techniques to elicit traffic pattern.However,studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common characteristics,namely lack of prior information(p(θ)),and reduced parameters(θ).Therefore,this study aims to utilize the previously built Feature Selection Model subsequently to design a Predictive Analytics Model based on Bayesian Network used to improve the analysis prediction.Feature Selection Model is used to learn significant label as a target and Bayesian Network is a sophisticated probabilistic approach to predict intrusion.Finally,the results are extended to evaluate detection,accuracy and false alarm rate of the model against the subject matter expert model,Support Vector Machine(SVM),k nearest neighbor(k-NN)using simulated and ground-truth dataset.The ground-truth dataset from the production traffic of one of the largest healthcare provider in Malaysia is used to promote realism on the real use case scenario.Results have shown that the proposed model consistently outperformed other models. 展开更多
关键词 intrusion detection prevention system behavioral malware analysis machine learning in cybersecurity deep learning in intrusion detection system(IDS)and intrusion prevention system(ips)
下载PDF
Network Intrusion Detection Model Using Fused Machine Learning Technique 被引量:1
2
作者 Fahad Mazaed Alotaibi 《Computers, Materials & Continua》 SCIE EI 2023年第5期2479-2490,共12页
With the progress of advanced technology in the industrial revolution encompassing the Internet of Things(IoT)and cloud computing,cyberattacks have been increasing rapidly on a large scale.The rapid expansion of IoT a... With the progress of advanced technology in the industrial revolution encompassing the Internet of Things(IoT)and cloud computing,cyberattacks have been increasing rapidly on a large scale.The rapid expansion of IoT and networks in many forms generates massive volumes of data,which are vulnerable to security risks.As a result,cyberattacks have become a prevalent and danger to society,including its infrastructures,economy,and citizens’privacy,and pose a national security risk worldwide.Therefore,cyber security has become an increasingly important issue across all levels and sectors.Continuous progress is being made in developing more sophisticated and efficient intrusion detection and defensive methods.As the scale of complexity of the cyber-universe is increasing,advanced machine learning methods are the most appropriate solutions for predicting cyber threats.In this study,a fused machine learning-based intelligent model is proposed to detect intrusion in the early stage and thus secure networks from harmful attacks.Simulation results confirm the effectiveness of the proposed intrusion detection model,with 0.909 accuracy and a miss rate of 0.091. 展开更多
关键词 Cyberattack machine learning prediction SOLUTION intrusion detection
下载PDF
PREDICTING THE CONSEQUENCES OF SEAWATER INTRUSION AND PROTECTION PROJECTS 被引量:2
3
作者 袁益让 梁栋 芮洪兴 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 2001年第11期1291-1300,共10页
The simulation of this process and the effects of protection projects lays the foundation of its effective control and defence. The mathematical model of the problem and upwind splitting alternating direction method w... The simulation of this process and the effects of protection projects lays the foundation of its effective control and defence. The mathematical model of the problem and upwind splitting alternating direction method were presented. Using this method, the numerical simulation of seawater intrusion in Laizhou Bay Area of Shandong Provivce was finished. The numerical results turned out to be identical with the real measurements, so the prediction of the consequences of protection projectects is reasonable. 展开更多
关键词 seawater intrusion predictive simulation numerical simulation splitting algorithm upwind scheme
下载PDF
Spectral decomposition method for predicting magmatic intrusion into a coal bed 被引量:3
4
作者 Wang Xin Chen Tongjun +1 位作者 Cui Ruofei Xu Yongzhong 《International Journal of Mining Science and Technology》 2012年第4期447-452,共6页
Accurate prediction of magmatic intrusion into a coal bed is illustrated using the method of seismic spectral decomposition.The characteristics of coal seismic reflections are first analyzed and the effect of variable... Accurate prediction of magmatic intrusion into a coal bed is illustrated using the method of seismic spectral decomposition.The characteristics of coal seismic reflections are first analyzed and the effect of variable time windows and domain frequencies on the spectral decomposition are examined.The higher domain frequency of coal bed reflections using the narrower STFT time window,or the smaller ST scale factor,are acceptable.When magmatic rock intrudes from the bottom of the coal bed the domain frequency of the reflections is decreased slightly,the frequency bandwidth is narrowed correspondingly,and the response from spectral decomposition is significantly reduced.Intrusion by a very thin magmatic rock gives a spectral decomposition response that is just slightly less than what is seen from a normal coal bed.Results from an actual mining area were used to validate the method.Predicting the boundary of magmatic intrusions with the method discussed herein was highly accurate and has been validated by observations from underground mining. 展开更多
关键词 岩浆侵入 煤层 分解方法 预测 岩浆岩侵入 地震反射 频率带宽 频谱
下载PDF
A Method for Detecting Intrusion on Networks in Real-time Based on IP Weight
5
作者 黄本雄 Lu +2 位作者 Wei Huang Zailu 《High Technology Letters》 EI CAS 2001年第2期34-38,共5页
A new rule to detect intrusion based on IP weight, which is also well implemented in the rule base of author’s NMS, is presented. Compared with traditional ones, intrusion detecting based on IP weight enhanced analys... A new rule to detect intrusion based on IP weight, which is also well implemented in the rule base of author’s NMS, is presented. Compared with traditional ones, intrusion detecting based on IP weight enhanced analysis to packet content. The method also provides a real-time efficient way to analyze traffic on high-speed network and can help to increase valid usage rates of network resources. Practical implementation as a rule in the rule base of our NMS has verified that the rule can detect not only attacks on network, but also other unusual behaviors. 展开更多
关键词 Network security intrusion detecting ip weight Detection of attacks Real-time analysis
下载PDF
辐状节点链接图在IPS日志分析中的研究与应用 被引量:1
6
作者 张胜 施荣华 赵珏 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第7期1774-1781,共8页
为了提高IPS(入侵防御系统)日志分析的效率和精准度,提出一种辐状节点链接图可视化分析方法。针对经典节点链接图随着数据量增加,节点变得拥挤、层次难以区分、空间利用率不高等问题,结合节点链接图和辐射图的优势,设计一种新的可视化... 为了提高IPS(入侵防御系统)日志分析的效率和精准度,提出一种辐状节点链接图可视化分析方法。针对经典节点链接图随着数据量增加,节点变得拥挤、层次难以区分、空间利用率不高等问题,结合节点链接图和辐射图的优势,设计一种新的可视化技术变形即辐状节点链接图。分析VAST 2013 Challenge比赛中IPS日志。研究结果表明:在大数据环境下,该技术能够合理分布节点以区分不同维度的IPS属性,利用可视化筛选降低图像密度,改进布局算法以合理利用显示面积以及产生图形的聚类;该方法能有效地感知网络安全态势,辅助分析人员决策;该辐状节点链接图的数据维度表现能力和业务层次控制能力较强。 展开更多
关键词 节点链接图 辐射图 网络安全日志 入侵防御系统 可视化分析
下载PDF
谈入侵防御系统(IPS)及其在图书馆中的应用 被引量:3
7
作者 卢福 《大学图书情报学刊》 2008年第5期34-37,共4页
入侵防御系统(IPS)是一种新型的网络安全系统,它是一种主支的、智能的入侵检测和防范阻止系统。在数字化和网络化图书馆网络中引入入侵防御系统(IPS),在网络安全中起着积极防御的作用。
关键词 网络安全 入侵防御系统(ips) 图书馆
下载PDF
IPS在图书馆网络安全防护中的应用研究
8
作者 张亮 《山东理工大学学报(自然科学版)》 CAS 2007年第6期104-107,共4页
在分析防火墙和入侵检测系统在网络安全防护方面缺陷的基础上,提出使用一种新改进的网络安全防护方法——入侵防御系统,分析了这种新的安全防护技术的工作原理、技术特征和优势以及面临的问题及发展前景.
关键词 入侵防御系统 入侵防御 ips 网络安全
下载PDF
基于威胁排序的分流结构IPS研究与设计
9
作者 陈正涛 金士尧 《计算机应用研究》 CSCD 北大核心 2009年第2期723-725,共3页
研究了在高速网络环境下的入侵防御系统设计与实现。分流系统本身缺乏有效的检测方法,不能对数据流量进行深层次的分析,所以其漏检率较高,应用范围有限。提出了一种用于分流系统的威胁排序方法,运用层次分析法对数据包的威胁程度进行排... 研究了在高速网络环境下的入侵防御系统设计与实现。分流系统本身缺乏有效的检测方法,不能对数据流量进行深层次的分析,所以其漏检率较高,应用范围有限。提出了一种用于分流系统的威胁排序方法,运用层次分析法对数据包的威胁程度进行排序,有效地解决了分流系统的漏检问题,并实现了一个完整的分流入侵防御系统的各模块设计,对其效能进行了初步评估。 展开更多
关键词 威胁排序 入侵防御系统 分流
下载PDF
Geoelectric Soundings for Delineation of Saline Water Intrusion into Aquifers in Part of Eastern Dahomey Basin, Nigeria 被引量:1
10
作者 Igbagbo A. Adeyemo Gregory O. Omosuyi Adebowale O. Adelusi 《Journal of Geoscience and Environment Protection》 2017年第3期213-232,共20页
This study was aimed at mapping the subsurface extent of saline water intrusions into aquifers at the eastern part of Dahomey basin, Nigeria. The study adopted geoelectric sounding methods. 108 vertical electrical sou... This study was aimed at mapping the subsurface extent of saline water intrusions into aquifers at the eastern part of Dahomey basin, Nigeria. The study adopted geoelectric sounding methods. 108 vertical electrical soundings (VES) and 9 induced polarization soundings (IPS) data were acquired using Schlumberger array technique. Three aquifer units were delineated across the study area. The resistivity of the first, second and third aquifer layers varies from 0.2 to 1569 ohm-m, 0.5 to 904 ohm-m and 0.4 to 665 ohm-m respectively, while depth to the top of first, second and third aquifer varies respectively from 0.7 to 151.5 m, 1.4 to 305.5 m and 12.9 to 452.9 m. The depth to the first aquifer layer is shallow (less than 5 m) in the coastal area which makes this area to be highly vulnerable to anthropogenic pollution while their proximity to Atlantic Ocean makes them susceptible to saline water intrusion. In all the three aquifer units, the coastal area, Agbabu and other few locations in the mainland are characterized by low resistivity values (below 60 ohm-m) indicating possible presence of brackish or saline water. IP sounding results showed that all the low resistive layers in the mainland are characterized by clayey materials. The integration of VES and IPS results enabled the delineation of the saline water lateral extent across the study area. There is a strong direct correlation (r2 = 0.8564) between location distance from the saline water source and depth to saline water in the study area. This can therefore serve as a predictive model to determine depth to saline water at any location within the saline water zone in the study area. 展开更多
关键词 SALINE Water intrusion Saline-Freshwater Boundary Vertical Electrical SOUNDING (VES) Induced Polarization SOUNDING (ips) Correlation Curve
下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
11
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 intrusion DETECTION SYSTEM (IDS) network-based intrusion DETECTION system(NIDS) SELF-PROTECTION AGENT ip filter
下载PDF
通过部署入侵防御系统(IPS)来提升网络安全 被引量:2
12
作者 刘忠华 《科技广场》 2009年第5期101-103,共3页
本文首先介绍了入侵防御系统(IPS)工作原理、IPS的分类,并且对比了防火墙、IDS相对于IPS的局限,提出通过部署入侵防御系统(IPS)来提升网络安全,以及应该怎样在网络中部署IPS。
关键词 入侵防御系统 ips 网络安全
下载PDF
Wavelet Neural Network Based Traffic Prediction for Next Generation Network
13
作者 赵其刚 李群湛 何正友 《Journal of Southwest Jiaotong University(English Edition)》 2005年第2期113-118,共6页
By using netflow traffic collecting technology, some traffic data for analysis are collected from a next generation network (NGN) operator. To build a wavelet basis neural network (NN), the Sigmoid function is rep... By using netflow traffic collecting technology, some traffic data for analysis are collected from a next generation network (NGN) operator. To build a wavelet basis neural network (NN), the Sigmoid function is replaced with the wavelet in NN. Then the wavelet multiresolution analysis method is used to decompose the traffic signal, and the decomposed component sequences are employed to train the NN. By using the methods, an NGN traffic prediction model is built to predict one day's traffic. The experimental results show that the traffic prediction method of wavelet NN is more accurate than that without using wavelet in the NGN traffic forecasting. 展开更多
关键词 Wavelet neural network ip traffic prediction Next generation network WAVELET
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
14
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL prediction Cyber Security Data Mining DENIAL and Deception Human Factors INSIDER Threats intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence Analysis Statistical LEARNING Transduction
下载PDF
面向IP网络扩容应用的复杂网络流量预测方法 被引量:1
15
作者 高勇 陆钱春 李锋 《电信科学》 2023年第9期21-31,共11页
IP网络扩容是通信运营商保持网络平稳运行的一种常见维护方式,核心在于预测未来一段时间的网络流量走势。IP网络流量非常复杂,具有局部不确定性、突发性、异质性等,给预测带来困难。提出了一种针对复杂网络流量的预测方法,它采用编码-... IP网络扩容是通信运营商保持网络平稳运行的一种常见维护方式,核心在于预测未来一段时间的网络流量走势。IP网络流量非常复杂,具有局部不确定性、突发性、异质性等,给预测带来困难。提出了一种针对复杂网络流量的预测方法,它采用编码-解码结构,即在编码层增加全局特征、在解码层增加全局特征和局部特征解析的方式解决局部不确定性;通过增加先验知识缓解突发性;模型采用样本均衡、归一化等方式尽量提取数据的共性,避开数据的异质性。模型整体的参数较少,具有较强的泛化性能;同时采用人工特征和自动特征结合方式保证了浅层网络的准确率。实验结果表明,所提出的方法具有准确率高、泛化性能强的特性。目前该方法已经在工程中大规模应用。 展开更多
关键词 网络流量预测 ip网络扩容 复杂网络流量
下载PDF
基于高斯混合模型的IPS日志异常IP地址检测技术研究
16
作者 周峰 郭娴 +1 位作者 林昕 赵汉青 《工业信息安全》 2022年第4期32-38,共7页
入侵防御系统(IPS)是一种广泛使用的安全系统,其将所阻止的攻击生成日志,供管理人员审查和进一步处理。然而,实际IPS日志中的大多数条目都不是攻击条目,这使得管理员无法通过简单的日志分析获得攻击者的IP地址。传统的日志分析方法依赖... 入侵防御系统(IPS)是一种广泛使用的安全系统,其将所阻止的攻击生成日志,供管理人员审查和进一步处理。然而,实际IPS日志中的大多数条目都不是攻击条目,这使得管理员无法通过简单的日志分析获得攻击者的IP地址。传统的日志分析方法依赖于管理员手动分析日志文本。因此,有必要使用异常检测方法进行分析。现有的大多数基于数据的异常自动检测方法,在保证计算要求和模型可解释性的前提下,无法获得令人满意的结果。采用高斯混合模型(GMM,Gaussian mixture model)对日志数据集上的异常IP地址进行检测。GMM方法提供了更好的检测结果,同时确保了相对较低的计算要求,并保持了模型的可解释性。实验表明,GMM方法检测IP地址异常的能力较强,是一种适合于基于日志数据的IP异常自动检测方法。 展开更多
关键词 入侵防御系统(ips) ip日志 ip异常检测 高斯混合模型
下载PDF
钦江河口盐水入侵距离预测模型研究
17
作者 肖毅 李达宏 +1 位作者 邓敬宏 夏楠 《重庆交通大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第5期32-37,45,共7页
平陆运河工程是中国“西部陆海新通道”的重要水运基础设施,青年枢纽作为运河最下游的节点性控制枢纽,受钦江感潮河段的盐水上溯的影响,合理预测盐水入侵距离对认识青年船闸寿命与城市饮用水安全具有重要意义。利用钦江河口盐水上溯过... 平陆运河工程是中国“西部陆海新通道”的重要水运基础设施,青年枢纽作为运河最下游的节点性控制枢纽,受钦江感潮河段的盐水上溯的影响,合理预测盐水入侵距离对认识青年船闸寿命与城市饮用水安全具有重要意义。利用钦江河口盐水上溯过程的实测数据,基于盐水上溯一维扩散稳态方程构建了考虑河口几何形状、潮汐作用及径流过程的高潮期盐水入侵长度预测模型,并通过径流与潮汐作用对钦江河口盐水入侵长度的影响分析,取得的主要结论为:当径流流量Q<100 m^(3)/s时,平陆运河工程后的高潮位期钦江河口盐水入侵长度L=10~27 km,较工程前增加了4.5 km;当径流流量Q<20 m^(3)/s时,钦江河口盐水将上溯至青年船闸闸下;枯水期,当河口潮差H 0>2.5 m时,青年枢纽减盐的最低泄流量须达到20 m^(3)/s。 展开更多
关键词 航道工程 钦江河口 盐水入侵长度 预测公式
下载PDF
IP欺骗攻击技术原理、方法、工具及对策 被引量:8
18
作者 蒋卫华 李伟华 杜君 《西北工业大学学报》 EI CAS CSCD 北大核心 2002年第4期544-548,共5页
IP欺骗技术 (IP Spoofing)起源较早 ,应用十分广泛。但黑客可以利用 IP欺骗技术截断正常的 TCP通信 ,或者冒充被目标主机所信任的机器向其发起 TCP连接。文中介绍了 IP欺骗技术的原理、方法以及常用工具 ,分析了在现有条件下解决这一问... IP欺骗技术 (IP Spoofing)起源较早 ,应用十分广泛。但黑客可以利用 IP欺骗技术截断正常的 TCP通信 ,或者冒充被目标主机所信任的机器向其发起 TCP连接。文中介绍了 IP欺骗技术的原理、方法以及常用工具 ,分析了在现有条件下解决这一问题的策略 ,并提出了建立高级模式匹配策略来进行入侵检测的方法 ,该方法可以有效地防御和检测 IP欺骗攻击。 展开更多
关键词 技术原理 ip欺骗攻击 入侵检测 模式匹配 网络安全
下载PDF
基于IP欺骗攻击的状态分析法研究 被引量:5
19
作者 陈晓苏 李永辉 肖道举 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第5期3-5,共3页
提出了一种能够在网络中检测并防范IP欺骗攻击的方法 .通过获取网络结点的工作状态 ,分析网络中出现的异常活动 ,给出了因攻击而引起的网络状态的迁移过程 .通过预测分析 ,及时检测出已经存在的IP欺骗攻击 ;通过回溯分析 ,试图找到发起... 提出了一种能够在网络中检测并防范IP欺骗攻击的方法 .通过获取网络结点的工作状态 ,分析网络中出现的异常活动 ,给出了因攻击而引起的网络状态的迁移过程 .通过预测分析 ,及时检测出已经存在的IP欺骗攻击 ;通过回溯分析 ,试图找到发起攻击的攻击者 .将状态分析法运用于入侵检测 ,可增强网络抵御IP欺骗攻击的能力 . 展开更多
关键词 ip欺骗 入侵检测 状态转移图
下载PDF
基于BP神经网络的IP网络流量预测 被引量:13
20
作者 陈晓天 张顺颐 田婷婷 《南京邮电大学学报(自然科学版)》 2010年第2期16-21,共6页
采用了BP神经网络对网络流量数据的时间序列进行建模与预测。从分析网络流量的特征着手,构建了基于BP神经网络的IP网络流量预测模型,并进行了仿真验证。实验结果表明,该模型对网络流量的预测是有效可行的,并具有良好的收敛性和稳定性。
关键词 ip网络 流量预测 服务质量 BP网络 时间序列
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部