期刊文献+

基于模糊理论的入侵检测技术研究

在线阅读 下载PDF
导出
摘要 对入侵检测技术进行了简要的介绍,并针对网络安全自身的模糊性,从基于数据挖掘的特征提取、基于模糊推理的数据分析和报警信息的模糊综合评判等三个方面,重点探讨了将模糊理论引入到入侵检测中的原理和方法,最后在此基础上进一步分析了目前模糊入侵检测的不足之处,并预测了模糊入侵检测的发展方向。
作者 罗磊
机构地区 解放军
出处 《中国水运(下半月)》 2008年第12期124-125,共2页
  • 相关文献

参考文献7

  • 1孙知信,徐红霞.模糊技术在入侵检测系统中的应用研究综述[J].南京邮电大学学报(自然科学版),2006,26(4):73-78. 被引量:14
  • 2穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:50
  • 3胡康兴,唐东斌.基于改进的加权关联规则的入侵检测[A]年全国理论计算机科学学术年会论文集,2005.
  • 4ZHANG Jian,,DING Yong,GONG Jian.Intrusion Detection System based on Fuzzy Default Logic. IEEE International Conference on Fuzzy Systems . 2003
  • 5Botha M,Von Solms R.Utilising fuzzy logic and trend analysis for effective intrusion detection. Computers and Security . 2003
  • 6J. E. Dickerson,,J. Juslin,,O. Koukousoula et al.Fuzzy Intrusion Detection. IFSA world Congress and 20th NAFIPS International Conference . 2001
  • 7H.Liu,andS.T.Huang.Evolutionary semi-supervised fuzzy clustering. PatternRecognitionLetter . 2003

二级参考文献29

  • 1Richard Stiennon. Intrusion Detection Is Dead-Long Live Intrusion Prevention. http: ∥ www. sans. org/rr/papers/index.php? id= 1028, 2003-06-11.
  • 2Peng Ning, Dingbang Xu. Learning attack strategies from intrusion alerts. The 10th ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., 2003.
  • 3Dan Schnackenberg, Harley Holliday, Randall Smith, et al.Cooperative intrusion traceback and response architecture.DARPA Information Survivability Conference and Exposition(DISCEX II'01), Anaheim, California, 2001.
  • 4Peng Ning, Y. Cui. An intrusion alert correlator based on prerequisites of intrusion. Department of Computer Science,North Carolina State University, Tech. Rep.: TR-2002-01,2002.
  • 5F. Cuppens, A. Miege. Alert correlation in a cooperative intrusion detection framework. The IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
  • 6A. Valdes, K. Skinner. Probabilistic alert correlation. The 4th Int'l Symposium on Recent Advances in Intrusion Detection(RAID 2001), Davis, CA, 2001.
  • 7O. Dain, R. K. Cunningham. Fusing a heterogeneous alert stream into scenarios. The 2001 ACM Workshop on Data Mining for Security Application, Philadelphia, Pennsylvania, 2001.
  • 8Curistis A. Carver, John M. D. Hill, Udo W. Pooch. Limiting uncertainty in intrusion response. The 2nd IEEE Information Assurance and Security Workshop, West Point, NY, 2001.
  • 9Brian Caswell, Jay Beale, James C. Foster, et al. Snort 2.0Intrusion Detection. Sebastopol, CA: Syngress publishing, Inc.,2003.
  • 10MARTIN B,ROSSOUW S.Utilising fuzzy logic and trend analysis for effective intrusion detection[J].Computers and Security,2003,22(5):423-434.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部