期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel 被引量:2
1
作者 ZHONG An-ming 1, JIA Chun-fu 1,21.College of Information Technology and Sciences, Nankai University, Tianjin 300071,China 2.State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039,China 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期137-141,共5页
A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusi... A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost. 展开更多
关键词 key words intrusion detection privilege flow model HSMM
下载PDF
A Novel Immune System Model and Its Application to Network Intrusion Detection 被引量:2
2
作者 LingJun CaoYang +1 位作者 YinJian-hua HuangTian-xi 《Wuhan University Journal of Natural Sciences》 CAS 2003年第02A期393-398,共6页
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I... Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model. 展开更多
关键词 key words network Intrusion Detection System 5 Immune System self profile automated self profile extraction algorithm
下载PDF
Skew Detection for Binary Document Images Using Mathematical Morphyology
3
作者 Xu Hong bo 1, Tian Yan 2 1. Department of Physics, Central China Normal University, Wuhan 430079, Hubei, China 2. Institute of Pattern Recognition and Artifical Intelligence, Huazhong University of Science and Technology, Wuhan 430074,Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2002年第3期338-340,共3页
The input document images with skew can be a serious problem in the optical character recognition system. A method is proposed for skew detection in binary document images using mathematic morphology. The basic proces... The input document images with skew can be a serious problem in the optical character recognition system. A method is proposed for skew detection in binary document images using mathematic morphology. The basic process of our approach consists of three steps: Firstly, a dilation operation is applied to the binary image; Secondly, the dilated image is thinned; Finally, the skew angle is detected using the Hough transform. The proposed approach with high precision can detect skew with large angle (?90δ-90Δ). The experimental result shows this method is applicable and efficient. 展开更多
关键词 key words skew detection DILATION THINNING Hough transform
下载PDF
Methods for Increasing Creditability of Anomaly Detection System
4
作者 YANQiao 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期79-82,共4页
Based on Bayes' theorem we point out that the false positive rate must be lower than the intrusion base rate in order to make the Alarm Credibility Probability of the intrusion detection system exceed 50%. We pres... Based on Bayes' theorem we point out that the false positive rate must be lower than the intrusion base rate in order to make the Alarm Credibility Probability of the intrusion detection system exceed 50%. We present the methods that have been used in our developing intrusion detection system AIIDS (artificial immune intrusion detection systems) to increase the creditability of anomaly detection system. These methods include increasing the regularities of the system call trace by use of Hidden Markov Model (HMM), making every antibody or detector has finite lifetime, offering the detector a co-stimulate signal to illustrate whether there is damage in the system according to the integrity, confidentiality, or availability of the system resource. 展开更多
关键词 key words intrusion detection creditability false positive rate
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部