期刊文献+
共找到1,433篇文章
< 1 2 72 >
每页显示 20 50 100
Network Intrusion Detection Model Based on Ensemble of Denoising Adversarial Autoencoder 被引量:1
1
作者 KE Rui XING Bin +1 位作者 SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第5期185-194,218,共11页
Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research si... Network security problems bring many imperceptible threats to the integrity of data and the reliability of device services,so proposing a network intrusion detection model with high reliability is of great research significance for network security.Due to the strong generalization of invalid features during training process,it is more difficult for single autoencoder intrusion detection model to obtain effective results.A network intrusion detection model based on the Ensemble of Denoising Adversarial Autoencoder(EDAAE)was proposed,which had higher accuracy and reliability compared to the traditional anomaly detection model.Using the adversarial learning idea of Adversarial Autoencoder(AAE),the discriminator module was added to the original model,and the encoder part was used as the generator.The distribution of the hidden space of the data generated by the encoder matched with the distribution of the original data.The generalization of the model to the invalid features was also reduced to improve the detection accuracy.At the same time,the denoising autoencoder and integrated operation was introduced to prevent overfitting in the adversarial learning process.Experiments on the CICIDS2018 traffic dataset showed that the proposed intrusion detection model achieves an Accuracy of 95.23%,which out performs traditional self-encoders and other existing intrusion detection models methods in terms of overall performance. 展开更多
关键词 intrusion detection Noise-Reducing autoencoder Generative adversarial networks Integrated learning
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
2
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
FLBS: Fuzzy lion Bayes system for intrusion detection in wireless communication network 被引量:2
3
作者 NARENDRASINH B Gohil VDEVYAS Dwivedi 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3017-3033,共17页
An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detecti... An important problem in wireless communication networks (WCNs) is that they have a minimum number of resources, which leads to high-security threats. An approach to find and detect the attacks is the intrusion detection system (IDS). In this paper, the fuzzy lion Bayes system (FLBS) is proposed for intrusion detection mechanism. Initially, the data set is grouped into a number of clusters by the fuzzy clustering algorithm. Here, the Naive Bayes classifier is integrated with the lion optimization algorithm and the new lion naive Bayes (LNB) is created for optimally generating the probability measures. Then, the LNB model is applied to each data group, and the aggregated data is generated. After generating the aggregated data, the LNB model is applied to the aggregated data, and the abnormal nodes are identified based on the posterior probability function. The performance of the proposed FLBS system is evaluated using the KDD Cup 99 data and the comparative analysis is performed by the existing methods for the evaluation metrics accuracy and false acceptance rate (FAR). From the experimental results, it can be shown that the proposed system has the maximum performance, which shows the effectiveness of the proposed system in the intrusion detection. 展开更多
关键词 intrusion detection wireless communication network fuzzy clustering naive Bayes classifier lion naive Bayes system
在线阅读 下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
4
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 intrusion detection SYSTEM (IDS) network-based intrusion detection system(nids) SELF-PROTECTION AGENT IP filter
在线阅读 下载PDF
Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
5
作者 DiWu ZhishengLiu +1 位作者 YongxinFeng GuangxingWang 《计算机工程与应用》 CSCD 北大核心 2004年第29期122-125,共4页
There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The int... There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network. 展开更多
关键词 入侵检测 移动AD-HOC网络 数据挖掘 网络安全 聚类检测
在线阅读 下载PDF
An infrared target intrusion detection method based on feature fusion and enhancement 被引量:12
6
作者 Xiaodong Hu Xinqing Wang +3 位作者 Xin Yang Dong Wang Peng Zhang Yi Xiao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第3期737-746,共10页
Infrared target intrusion detection has significant applications in the fields of military defence and intelligent warning.In view of the characteristics of intrusion targets as well as inspection difficulties,an infr... Infrared target intrusion detection has significant applications in the fields of military defence and intelligent warning.In view of the characteristics of intrusion targets as well as inspection difficulties,an infrared target intrusion detection algorithm based on feature fusion and enhancement was proposed.This algorithm combines static target mode analysis and dynamic multi-frame correlation detection to extract infrared target features at different levels.Among them,LBP texture analysis can be used to effectively identify the posterior feature patterns which have been contained in the target library,while motion frame difference method can detect the moving regions of the image,improve the integrity of target regions such as camouflage,sheltering and deformation.In order to integrate the advantages of the two methods,the enhanced convolutional neural network was designed and the feature images obtained by the two methods were fused and enhanced.The enhancement module of the network strengthened and screened the targets,and realized the background suppression of infrared images.Based on the experiments,the effect of the proposed method and the comparison method on the background suppression and detection performance was evaluated,and the results showed that the SCRG and BSF values of the method in this paper had a better performance in multiple data sets,and it’s detection performance was far better than the comparison algorithm.The experiment results indicated that,compared with traditional infrared target detection methods,the proposed method could detect the infrared invasion target more accurately,and suppress the background noise more effectively. 展开更多
关键词 Target intrusion detection Convolutional neural network Feature fusion Infrared target
在线阅读 下载PDF
Grey-theory based intrusion detection model 被引量:3
7
作者 Qin Boping Zhou Xianwei Yang Jun Song Cunyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期230-235,共6页
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theor... To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international. 展开更多
关键词 network security intrusion detection grey theory model.
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
8
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Novel design concepts for network intrusion systems based on dendritic cells processes 被引量:2
9
作者 RICHARD M R 谭冠政 +1 位作者 ONGALO P N F CHERUIYOT W 《Journal of Central South University》 SCIE EI CAS 2013年第8期2175-2185,共11页
An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are presented. Computationally, this ability is shown to provide a feature reduction mechanism... An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are presented. Computationally, this ability is shown to provide a feature reduction mechanism that could be used to reduce the complexity of a search space, a mechanism for development of highly specialized detector sets as well as a selective mechanism used in directing subsets of detectors to be activated when certain danger signals are present. It is shown that DCs, primed by different danger signals, provide a basis for different anomaly detection pathways. Different antigen-peptides are developed based on different danger signals present, and these peptides are presented to different adaptive layer detectors that correspond to the given danger signal. Experiments are then undertaken that compare current approaches, where a full antigen structure and the whole repertoire of detectors are used, with the proposed approach. Experiment results indicate that such an approach is feasible and can help reduce the complexity of the problem by significant levels. It also improves the efficiency of the system, given that only a subset of detectors are involved during the detection process. Having several different sets of detectors increases the robustness of the resulting system. Detectors developed based on peptides are also highly discriminative, which reduces the false positives rates, making the approach feasible for a real time environment. 展开更多
关键词 artificial immune systems network intrusion detection anomaly detection feature reduction negative selectionalgorithm danger model
在线阅读 下载PDF
一种基于主动网络的入侵检测系统ANIDS 被引量:6
10
作者 陈妍 李增智 +1 位作者 廖志刚 寇雅楠 《计算机工程》 EI CAS CSCD 北大核心 2005年第2期133-134,165,共3页
提出了一种基于主动网络的入侵检测系统框架ANIDS,它结合了基于主机的和基于网络的入侵检测系统的思想,具有灵活性好、可扩展性强以及高效率等优点。同时,由于主动网络的可编程特性,ANIDS还是一个集入侵检测、网络管理、网络监控三位一... 提出了一种基于主动网络的入侵检测系统框架ANIDS,它结合了基于主机的和基于网络的入侵检测系统的思想,具有灵活性好、可扩展性强以及高效率等优点。同时,由于主动网络的可编程特性,ANIDS还是一个集入侵检测、网络管理、网络监控三位一体的系统。 展开更多
关键词 主动网络 基于网络的入侵检测系统 可扩展性 网络监控 主机 网络管理 可编程 高效率 优点 灵活性
在线阅读 下载PDF
基于人工免疫的NIDS研究进展(英文) 被引量:5
11
作者 罗文坚 张四海 +2 位作者 梁文 曹先彬 王煦法 《中国科学技术大学学报》 CAS CSCD 北大核心 2002年第5期530-541,共12页
现有网络入侵检测系统的关键不足在于不能识别未知模式的入侵 ,智能水平低 .生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义 .论文通过抽取生物免疫系统中所蕴涵的各种信息处理机制 ,将网络数据传输行为分为... 现有网络入侵检测系统的关键不足在于不能识别未知模式的入侵 ,智能水平低 .生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义 .论文通过抽取生物免疫系统中所蕴涵的各种信息处理机制 ,将网络数据传输行为分为正常和异常行为 ,分别对应为网络的自我与非我 ,建立了一个基于人工免疫的网络入侵检测系统原型 .系统中蕴涵的生物免疫机制主要有非我识别机制、免疫进化机制等 .本文着重介绍此原型系统的结构和特征、免疫识别算法 ,并进行了实际检测实验 .实验结果表明生物免疫的自我保护机制在网络入侵检测系统方面具有很强的应用前景 . 展开更多
关键词 nids 研究进展 网络入侵检测系统 人工免疫 未知入侵模式 免疫进化 免疫识别 网络安全
在线阅读 下载PDF
ARTNIDS:基于自适应谐振理论的网络入侵检测系统 被引量:8
12
作者 田大新 刘衍珩 魏达 《计算机学报》 EI CSCD 北大核心 2005年第11期1882-1889,共8页
分析了现有的入侵检测方法,设计了基于自适应谐振理论的网络入侵检测系统(ARTNIDS).它采用了一种全新的行为表示方法,即根据网络数据包结构定义网络行为特征变量;利用改进的自适应谐振理论算法,提高了学习效率,使丢包率由15%左右降低到... 分析了现有的入侵检测方法,设计了基于自适应谐振理论的网络入侵检测系统(ARTNIDS).它采用了一种全新的行为表示方法,即根据网络数据包结构定义网络行为特征变量;利用改进的自适应谐振理论算法,提高了学习效率,使丢包率由15%左右降低到10%以下,实现了无监督和在线实时学习;提出的类似Hamming距离的检测算法,使误报率低于10%.依上述方法构造的原型系统经实验证明能高效地检测出局域网内的入侵行为. 展开更多
关键词 入侵检测 自适应谐振理论 HAMMING距离 网络 数据包
在线阅读 下载PDF
基于人工免疫原理的NIDS系统和有关算法设计 被引量:7
13
作者 杨向荣 沈钧毅 刘强 《小型微型计算机系统》 CSCD 北大核心 2004年第3期380-383,共4页
给出一种基于人工免疫原理的网络入侵检测系统 (NIDS)模型 ,它以频繁序列模式为基础建立自体模式集和异己模式集 ,随后给出了一种有效的模式编码算法 .在这种编码基础上文章提出一种用于检测器生成的集否定选择和克隆选择为一体的算法 .
关键词 网络入侵检测系统 人工免疫系统 否定选择 克隆选择 数据挖掘 人工免疫原理 nids系统 网络安全
在线阅读 下载PDF
基于IXP2400开发NIDS负载均衡器的研究 被引量:1
14
作者 陈宇 薛鹏 +2 位作者 翟伟斌 刘宝旭 许榕生 《计算机工程》 CAS CSCD 北大核心 2007年第1期104-105,127,共3页
分析了高速网络环境下基于分流机制实现的NIDS体系架构,探讨了其核心部件——NIDS负载均衡器的实现及关键算法,给出了其在网络处理器上的具体实现。实验表明,基于IXP 2400网络处理器实现的负载均衡器具有成本低、研发周期短、可扩展性... 分析了高速网络环境下基于分流机制实现的NIDS体系架构,探讨了其核心部件——NIDS负载均衡器的实现及关键算法,给出了其在网络处理器上的具体实现。实验表明,基于IXP 2400网络处理器实现的负载均衡器具有成本低、研发周期短、可扩展性好的特点,完全能满足NIDS分流架构的需求,基本解决了高速网络下网络入侵检测设备的性能问题。 展开更多
关键词 入侵检测 高速网 数据分流 网络处理器
在线阅读 下载PDF
多核平台上B-NIDS的优化 被引量:1
15
作者 孙小涓 孙凝晖 陈明宇 《计算机研究与发展》 EI CSCD 北大核心 2007年第10期1733-1740,共8页
计算进入了多核时代,处理器的发展不再由更快的主频带动,而是依靠增加片上的多个核心.但是,对于高性能应用来说,多核平台的并行处理由于缺少适合的并行程序开发工具还处于初始阶段.一个串行B-NIDS的优化需要对底层线程结构的深入了解和... 计算进入了多核时代,处理器的发展不再由更快的主频带动,而是依靠增加片上的多个核心.但是,对于高性能应用来说,多核平台的并行处理由于缺少适合的并行程序开发工具还处于初始阶段.一个串行B-NIDS的优化需要对底层线程结构的深入了解和正确使用.发现了现有并行系统基于细粒度锁同步机制的瓶颈,根据应用的数据流特点提出了没有竞争的同步机制.然后,提出了改进系统三级流水的多线程结构,并实现了不同特征流的差别服务.在性能评价中,改进系统在8核32线程服务器上从资源占用、吞吐率及响应时间3个方面都表现出了更好的性能. 展开更多
关键词 网络入侵检测 多核 并行优化 同步开销 多线程程序模型
在线阅读 下载PDF
基于logs2intrusions与Web Log Explorer的综合取证分析研究 被引量:1
16
作者 杨晶 赵鑫 芦天亮 《信息网络安全》 CSCD 2017年第3期33-38,共6页
随着互联网应用的迅猛增长,其受到的安全威胁也越来越严重,尤其是网络入侵攻击事件造成了极大的危害。目前,对入侵行为检测的一种必要手段是对日志数据进行分析,网站日志文件是记录Web服务器接收处理请求以及运行时错误等各种原始信息... 随着互联网应用的迅猛增长,其受到的安全威胁也越来越严重,尤其是网络入侵攻击事件造成了极大的危害。目前,对入侵行为检测的一种必要手段是对日志数据进行分析,网站日志文件是记录Web服务器接收处理请求以及运行时错误等各种原始信息的文件,但目前来看网络日志文件的作用还有待进一步提升。文章分析了logs2intrusions、Web Log Explorer、光年SEO日志分析系统、逆火网站分析器这四种日志分析工具的特性,提出了基于logs2intrusions和Web Log Explorer两个工具优势的综合取证分析技术,实现了对大批量入侵攻击日志数据的快速分析处理,提高了对网络入侵攻击行为识别的准确率。 展开更多
关键词 网络入侵检测 logs2intrusions WebLogExplorer 系统日志
在线阅读 下载PDF
NIDS中正则表达式匹配电路的改进与优化 被引量:1
17
作者 田里 《计算机工程》 CAS CSCD 北大核心 2010年第3期136-138,共3页
对网络入侵检测系统(NIDS)中复杂正则表达式匹配电路进行改进和优化。为达到最大吞吐量和最小的单位字符占用资源量,设计利用预译码、前缀树、规则分组、并行处理等方法进行结构优化。实验结果表明,改进后的电路结构提高了约47%匹配速度... 对网络入侵检测系统(NIDS)中复杂正则表达式匹配电路进行改进和优化。为达到最大吞吐量和最小的单位字符占用资源量,设计利用预译码、前缀树、规则分组、并行处理等方法进行结构优化。实验结果表明,改进后的电路结构提高了约47%匹配速度,缩减了约39%的电路面积,具有较低的资源占用和更广泛的适用性。 展开更多
关键词 网络入侵检测系统 正则表达式 预译码 前缀树 规则分组 并行处理
在线阅读 下载PDF
NIDS警报分析系统模型设计与分析
18
作者 叶震 钱焜 白永志 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第11期1377-1380,共4页
网络入侵检测系统(N IDS)是一种检测网络入侵行为的工具,但在实际应用中,警报量多、误警率高,已经严重制约了N IDS的发展。文章分析了其产生的原因,提出了一种基于异常检测技术的N IDS警报分析系统模型;重点讨论了数据挖掘技术在该模型... 网络入侵检测系统(N IDS)是一种检测网络入侵行为的工具,但在实际应用中,警报量多、误警率高,已经严重制约了N IDS的发展。文章分析了其产生的原因,提出了一种基于异常检测技术的N IDS警报分析系统模型;重点讨论了数据挖掘技术在该模型中的应用。 展开更多
关键词 网络入侵检测系统 误警率 数据挖掘 异常检测 入侵警报
在线阅读 下载PDF
基于人工免疫的NIDS数据库模型
19
作者 王勇 黄国兴 彭道刚 《计算机工程》 CAS CSCD 北大核心 2006年第20期150-152,共3页
结合关系数据库的常用方法,提出了一种网络入侵检测模型。该模型是根据人工免疫系统分布式自组织特征建立的。研究了人工免疫系统中的入侵、选择、交叉和复制的特征,给出了R位连续匹配算法。实验结果表明该模型是有效的。
关键词 入侵检测 网络安全 人工免疫
在线阅读 下载PDF
网络入侵检测系统(NIDS)的分析与研究
20
作者 龚尚福 赵伟 《工矿自动化》 北大核心 2002年第6期18-20,共3页
论述了网络安全的重要性并简要介绍几种传统的网络安全技术 ,分析和研究了入侵检测系统的模型及其原理 ,并介绍信息网络入侵检测系统的国内外研究动态 。
关键词 网络入侵检测系统 网络安全 防火墙 发展趋势
在线阅读 下载PDF
上一页 1 2 72 下一页 到第
使用帮助 返回顶部