期刊文献+
共找到3,496篇文章
< 1 2 175 >
每页显示 20 50 100
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder 被引量:1
1
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
在线阅读 下载PDF
Intrusion detection based on system calls and homogeneous Markov chains 被引量:8
2
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Li Wenfa 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期598-605,共8页
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ... A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems. 展开更多
关键词 intrusion detection Markov chain anomaly detection system call.
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
3
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
An infrared target intrusion detection method based on feature fusion and enhancement 被引量:12
4
作者 Xiaodong Hu Xinqing Wang +3 位作者 Xin Yang Dong Wang Peng Zhang Yi Xiao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第3期737-746,共10页
Infrared target intrusion detection has significant applications in the fields of military defence and intelligent warning.In view of the characteristics of intrusion targets as well as inspection difficulties,an infr... Infrared target intrusion detection has significant applications in the fields of military defence and intelligent warning.In view of the characteristics of intrusion targets as well as inspection difficulties,an infrared target intrusion detection algorithm based on feature fusion and enhancement was proposed.This algorithm combines static target mode analysis and dynamic multi-frame correlation detection to extract infrared target features at different levels.Among them,LBP texture analysis can be used to effectively identify the posterior feature patterns which have been contained in the target library,while motion frame difference method can detect the moving regions of the image,improve the integrity of target regions such as camouflage,sheltering and deformation.In order to integrate the advantages of the two methods,the enhanced convolutional neural network was designed and the feature images obtained by the two methods were fused and enhanced.The enhancement module of the network strengthened and screened the targets,and realized the background suppression of infrared images.Based on the experiments,the effect of the proposed method and the comparison method on the background suppression and detection performance was evaluated,and the results showed that the SCRG and BSF values of the method in this paper had a better performance in multiple data sets,and it’s detection performance was far better than the comparison algorithm.The experiment results indicated that,compared with traditional infrared target detection methods,the proposed method could detect the infrared invasion target more accurately,and suppress the background noise more effectively. 展开更多
关键词 Target intrusion detection Convolutional neural network Feature fusion Infrared target
在线阅读 下载PDF
Grey-theory based intrusion detection model 被引量:3
5
作者 Qin Boping Zhou Xianwei Yang Jun Song Cunyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期230-235,共6页
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theor... To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international. 展开更多
关键词 network security intrusion detection grey theory model.
在线阅读 下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network 被引量:2
6
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
在线阅读 下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
7
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 intrusION detection SYSTEM (ids) network-based intrusION detection system(Nids) SELF-PROTECTION AGENT IP filter
在线阅读 下载PDF
An Adaptive Clustering Algorithm for Intrusion Detection
8
作者 QIU Juli 《现代电子技术》 2007年第2期130-132,共3页
In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-statio... In this paper,we introduce an adaptive clustering algorithm for intrusion detection based on wavecluster which was introduced by Gholamhosein in 1999 and used with success in image processing.Because of the non-stationary characteristic of network traffic,we extend and develop an adaptive wavecluster algorithm for intrusion detection.Using the multiresolution property of wavelet transforms,we can effectively identify arbitrarily shaped clusters at different scales and degrees of detail,moreover,applying wavelet transform removes the noise from the original feature space and make more accurate cluster found.Experimental results on KDD-99 intrusion detection dataset show the efficiency and accuracy of this algorithm.A detection rate above 96% and a false alarm rate below 3% are achieved. 展开更多
关键词 CLUSTERING data mining intrusion detection wavelet transforms
在线阅读 下载PDF
Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
9
作者 DiWu ZhishengLiu +1 位作者 YongxinFeng GuangxingWang 《计算机工程与应用》 CSCD 北大核心 2004年第29期122-125,共4页
There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The int... There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network. 展开更多
关键词 入侵检测 移动AD-HOC网络 数据挖掘 网络安全 聚类检测
在线阅读 下载PDF
IDS入侵检测系统研究 被引量:33
10
作者 李镇江 戴英侠 陈越 《计算机工程》 CAS CSCD 北大核心 2001年第4期7-9,共3页
在分布式计算环境中,信息系统首先需要考虑的就是保护数据和资源免遭未授权的非法访问、操作,甚至恶意入侵和破坏,因此安全管理日益成为人们关注的焦点。在诸多的新兴技术中,IDS(入侵检测系统)以它新颖的思路和广阔的应用前景而... 在分布式计算环境中,信息系统首先需要考虑的就是保护数据和资源免遭未授权的非法访问、操作,甚至恶意入侵和破坏,因此安全管理日益成为人们关注的焦点。在诸多的新兴技术中,IDS(入侵检测系统)以它新颖的思路和广阔的应用前景而倍受青睐。介绍IDS的历史和现状,说明现有IDS的不足以及今后ID技术的发展趋势。 展开更多
关键词 入侵检测系统 ids 计算机网络 TCP/IP协议 网络安全 信息安全
在线阅读 下载PDF
基于移动agent的分布式入侵检测系统MAIDS的设计与实现 被引量:5
11
作者 肖建华 张建忠 +1 位作者 江罡 吴功宜 《计算机工程与应用》 CSCD 北大核心 2003年第17期164-165,180,共3页
阐述了基于移动agent技术的分布式入侵检测系统MAIDS的设计与实现。该系统利用了当前正在广泛研究的移动agent技术,主要由控制服务器和受检测主机两部分组成,它可同时对主机和网络进行检测,并具有一定的智能性和灵活性,克服了传统IDS的... 阐述了基于移动agent技术的分布式入侵检测系统MAIDS的设计与实现。该系统利用了当前正在广泛研究的移动agent技术,主要由控制服务器和受检测主机两部分组成,它可同时对主机和网络进行检测,并具有一定的智能性和灵活性,克服了传统IDS的一些缺陷。 展开更多
关键词 MAids 入侵检测 ids 移动AGENT AGENT
在线阅读 下载PDF
一种改进的IDS异常检测模型 被引量:21
12
作者 孙宏伟 田新广 +1 位作者 李学春 张尔扬 《计算机学报》 EI CSCD 北大核心 2003年第11期1450-1455,共6页
基于机器学习的异常检测是目前IDS研究的一个重要方向 .该文对一种基于机器学习的用户行为异常检测模型进行了描述 ,在此基础上提出一种改进的检测模型 .该模型利用多种长度不同的shell命令序列表示用户行为模式 ,建立多个样本序列库来... 基于机器学习的异常检测是目前IDS研究的一个重要方向 .该文对一种基于机器学习的用户行为异常检测模型进行了描述 ,在此基础上提出一种改进的检测模型 .该模型利用多种长度不同的shell命令序列表示用户行为模式 ,建立多个样本序列库来描述合法用户的行为轮廓 ,并在检测中采用了以shell命令为单位进行相似度赋值的方法 .文中对两种模型的特点和性能做了对比分析 ,并介绍了利用UNIX用户shell命令数据进行的实验 .实验结果表明 ,在虚警概率相同的情况下改进的模型具有更高的检测概率 . 展开更多
关键词 ids 入侵检测系统 异常检测模型 计算机网络 网络安全 机器学习
在线阅读 下载PDF
网络入侵检测系统RIDS的研究 被引量:7
13
作者 夏春和 张欣 《系统仿真学报》 CAS CSCD 2000年第4期375-379,共5页
入侵检测是网络安全的一个新方向 ,入侵检测的重点是如何有效地提取特征数据并准确地分析出非正常网络行为。本文在深入研究分析公共入侵检测框架 (CIDF)理论和现有入侵检测系统 (IDS)实现策略的基础上 ,提出了一种基于资源监视的入侵... 入侵检测是网络安全的一个新方向 ,入侵检测的重点是如何有效地提取特征数据并准确地分析出非正常网络行为。本文在深入研究分析公共入侵检测框架 (CIDF)理论和现有入侵检测系统 (IDS)实现策略的基础上 ,提出了一种基于资源监视的入侵检测概念 ,给出了以资源监视为中心的主机监视和网络监视相结合的网络入侵检测系统RIDS的模型 。 展开更多
关键词 计算机网络 网络入侵检测系统 RTDS 网络安全
在线阅读 下载PDF
入侵检测系统IDS的安全性研究 被引量:6
14
作者 刘俊强 饶元 霍华 《计算机应用研究》 CSCD 北大核心 2003年第11期69-72,共4页
通过对IDS系统的安全性和脆弱性的分析,提出了IDS系统安全度、入侵度以及脆弱度等安全评价指标,并在总结目前存在的攻击和躲避IDS系统的工具及技术的基础上,设计了一个新型的IDS安全体系结构实用配置模型。
关键词 入侵检测系统 网络安全 安全度 脆弱性
在线阅读 下载PDF
DAPRA测试分析和IDS测试方法研究 被引量:4
15
作者 吕志军 金毅 +2 位作者 赖海光 黄皓 谢立 《计算机科学》 CSCD 北大核心 2004年第11期73-76,共4页
对入侵检测系统的测试是一个系统过程,需要研究攻击测试方法、评价标准等多方面内容。美国国防部高级计划研究局(DARPA)对IDS的两次测试是最有影响的测试。通过对这两次测试以及其它测试评估标准的分析,指出了测试IDS系统的技术难点和重... 对入侵检测系统的测试是一个系统过程,需要研究攻击测试方法、评价标准等多方面内容。美国国防部高级计划研究局(DARPA)对IDS的两次测试是最有影响的测试。通过对这两次测试以及其它测试评估标准的分析,指出了测试IDS系统的技术难点和重点,从可靠性、可用性、速度、精确度等方面提出了进一步评估IDS的方法。 展开更多
关键词 ids系统 入侵检测系统 测试评估 攻击 DARPA 可用性 测试方法 高级 美国国防部 可靠性
在线阅读 下载PDF
一种IDS报警可信性增强方案 被引量:2
16
作者 柴争义 林琳 +1 位作者 王建文 齐传辉 《计算机应用研究》 CSCD 北大核心 2009年第9期3496-3498,共3页
提高IDS(入侵检测系统)报警的可信性是IDS的根本目标。从理论上分析了可信问题产生的原因,给出了其形式化描述,提出了一种多IDS协同工作提高检测可信度的方法,并证明了该方法可以应用于各种不同IDS的协同工作中(基于误用、异常及异常与... 提高IDS(入侵检测系统)报警的可信性是IDS的根本目标。从理论上分析了可信问题产生的原因,给出了其形式化描述,提出了一种多IDS协同工作提高检测可信度的方法,并证明了该方法可以应用于各种不同IDS的协同工作中(基于误用、异常及异常与误用相结合的IDS)。多检测系统结果融合时采用推进Bayesian分类方法,给出了其模型和具体算法。实验分析表明,该方法与其他同类算法相比,降低了系统的漏报率和误报率,增强了报警的可信度。 展开更多
关键词 入侵检测系统 可信性 推进Bayesian方法
在线阅读 下载PDF
基于人工免疫的NIDS研究进展(英文) 被引量:5
17
作者 罗文坚 张四海 +2 位作者 梁文 曹先彬 王煦法 《中国科学技术大学学报》 CAS CSCD 北大核心 2002年第5期530-541,共12页
现有网络入侵检测系统的关键不足在于不能识别未知模式的入侵 ,智能水平低 .生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义 .论文通过抽取生物免疫系统中所蕴涵的各种信息处理机制 ,将网络数据传输行为分为... 现有网络入侵检测系统的关键不足在于不能识别未知模式的入侵 ,智能水平低 .生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义 .论文通过抽取生物免疫系统中所蕴涵的各种信息处理机制 ,将网络数据传输行为分为正常和异常行为 ,分别对应为网络的自我与非我 ,建立了一个基于人工免疫的网络入侵检测系统原型 .系统中蕴涵的生物免疫机制主要有非我识别机制、免疫进化机制等 .本文着重介绍此原型系统的结构和特征、免疫识别算法 ,并进行了实际检测实验 .实验结果表明生物免疫的自我保护机制在网络入侵检测系统方面具有很强的应用前景 . 展开更多
关键词 Nids 研究进展 网络入侵检测系统 人工免疫 未知入侵模式 免疫进化 免疫识别 网络安全
在线阅读 下载PDF
MAIDS系统中的检测功能模块 被引量:1
18
作者 肖建华 张建忠 +2 位作者 辛颖 周思儒 吴功宜 《计算机工程》 CAS CSCD 北大核心 2003年第13期69-70,81,共3页
阐述基于移动agent技术的入侵检测系统中检测功能模块的设计与实现。系统中检测功能主要是由两种移动agent来完成的,即主机检测agent和网络检测agent,它们共同工作,一起完成对网络及其中主机的入侵检测,使系统具有较好的性能和扩展性。
关键词 MAids 入侵检测 ids 移动AGENT 检测模块
在线阅读 下载PDF
分类异常点检测算法及在IDS模型中的应用 被引量:2
19
作者 钱昌明 李国庆 黄皓 《计算机应用研究》 CSCD 北大核心 2006年第4期94-96,共3页
在分析了各种异常点检测算法的基础上,提出了一种分类异常点检测算法,该方法能够对数据在各个方面表现出的异常情况进行全面检测,精确度高、时间消耗少。提出了一个入侵检测系统模型,包括异常检测层和误用检测层,在异常检测中应用了分... 在分析了各种异常点检测算法的基础上,提出了一种分类异常点检测算法,该方法能够对数据在各个方面表现出的异常情况进行全面检测,精确度高、时间消耗少。提出了一个入侵检测系统模型,包括异常检测层和误用检测层,在异常检测中应用了分类异常点检测方法,该模型可以明显减少系统的漏报率。 展开更多
关键词 入侵检测系统 异常检测 异常点检测 分类
在线阅读 下载PDF
入侵检测系统AIDS的研究与设计 被引量:5
20
作者 盛思源 战守义 陈谊 《计算机工程与应用》 CSCD 北大核心 2002年第1期55-57,244,共4页
在分析了入侵检测系统基本概念的基础上,针对目前入侵检测系统中存在的问题,提出了一个自适应的入侵检测系统模型。阐明了自适应入侵检测系统的设计方法,着重分析了该系统的信息处理流程、软件设计原则、及关键技术问题。最后简要说明... 在分析了入侵检测系统基本概念的基础上,针对目前入侵检测系统中存在的问题,提出了一个自适应的入侵检测系统模型。阐明了自适应入侵检测系统的设计方法,着重分析了该系统的信息处理流程、软件设计原则、及关键技术问题。最后简要说明了该系统模型的优势所在。 展开更多
关键词 网络安全 入侵检测 自适应入侵检测
在线阅读 下载PDF
上一页 1 2 175 下一页 到第
使用帮助 返回顶部