期刊文献+

高速网络环境下的自适应入侵检测方法研究 被引量:17

Research on intrusion detection with self-adaptability for high-speed network
在线阅读 下载PDF
导出
摘要 为了实现高速网络环境下的入侵检测,对入侵检测的机理进行探讨,将入侵检测归结于不完备数据集上的推理过程,提出知识库的相似度、完备度等概念,并用其对知识库的规模和增长速度进行控制,从而保证入侵检测在有限规模的空间中进行搜索。同时,采用信息增益等方法将入侵检测转换到低维空间上进行。实验结果表明上述方法有效降低了入侵检测系统的计算负荷,提高了其实时响应性能。 In order to detect intrusions of high-speed network,the mechanism of intrusion detection is discussed.Intrusion detection is reduced to an inference procedure on an incomplete data set.The concepts of self-similarity degree and completeness degree of the knowledge base are proposed.They are used to control the scale and increasing speed of the knowledge base so that intrusion detection is assured to be proceeded in a limited space.At the same time,information gain is used to make intrusion detection to running in a lower space.The experiments show that the proposed method reduces the calculation load of intrusion detection systems effectively and enhances its real time performance.
作者 史志才
出处 《计算机工程与应用》 CSCD 北大核心 2009年第17期88-90,112,共4页 Computer Engineering and Applications
基金 上海工程技术大学科研基金项目(No.07-22) 上海市教委科研创新项目(No.09YZ370)~~
关键词 计算机网络 信息安全 入侵检测 computer network information security intrusion detection
作者简介 史志才(1964-),男,博士,教授,CCF高级会员,主要研究领域:计算机网络与信息安全,图形图像处理。
  • 相关文献

参考文献6

  • 1Sherif J S.Intrusion detection:the art and the praetice[J].Information Management and Computer Security, 2003,11 (5) : 175-186.
  • 2Sodiya A S,Longe H O D,Akinwale A T.A new two-tiered strategy to intrusion detection[J].Information Management and Computer Security, 2004,12( 1 ) :27-44.
  • 3Sherif J S,Ayers R.Intrusion detection:methods and systems.Part Ⅱ[J]. Information Management and Computer Security, 2003,11 (5) : 222- 229.
  • 4Jiang WangBao,Song Hua.Real time intrusion detection for highspeed networks[J].Computer&Security, 2005,24: 287-294.
  • 5蒋文保,郝双,戴一奇,刘庭华.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110. 被引量:29
  • 6陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78

二级参考文献7

  • 1Schaelicke L,Slabach T,Moore B,et al.Characterizing the performance of network intrusion detection sensors[A].Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
  • 2Coit J,Staniford S,McAlerney J.Towards faster string matching for intrusion detection or exceeding the speed of snort[A].Proc DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ '02)[C].Los Alamitos,Calif:IEEE CS Press,2001.367-373.
  • 3Edwards S.Vulnerabilities of Network Intrusion Detection Systems:Realizing and Overcoming the Risks[Z].Toplayer Networks,2002.
  • 4Kruegel C,Valeur F,Vigna G,et al.Stateful intrusion detection for high-speed networks[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Berkeley,CA:IEEE,2002.285-294.
  • 5Asser N.Tantawi,Don Towsley.Optimal static load balancing in distributed computer systems[J].Journal of the ACM,1985,32(2):445-465.
  • 6Keith W R,David D Y.Optimal load balancing and scheduling in a distributed computer system[J].Journal of the ACM,1991,38(3):676-690.
  • 7饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:135

共引文献104

同被引文献133

引证文献17

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部