期刊文献+

基于Markov Chain的协议异常检测模型 被引量:6

Protocol Anomaly Detection Model Based on Markov Chain
在线阅读 下载PDF
导出
摘要 本文介绍了基于Markov链的协议异常检测模型,此外,通过对MIT Lincoln实验室1999评估数据的分析,证明此模型的正确性和有效性。 The model for protocol anomaly detection based on Markov Chain is introduced in this paper. We also prove our model's correctness and effectiveness by analyzing MIT Lincoln laboratory 1999 evaluation data set.
出处 《计算机科学》 CSCD 北大核心 2004年第10期66-68,95,共4页 Computer Science
基金 国家863项目(No.2003AA118201) 国家自然科学(No.60273070)资助
关键词 异常检测模型 协议 正确性 数据 MARKOV链 MIT 证明 实验室 有效性 Intrusion detection system, Markov chain, Protocol anomaly
  • 相关文献

参考文献7

  • 1Estevez-Tapiador J M, et al. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. In:Proc. of the First IEEE Intl. Workshop on Information Assurance(IWIA'2003)
  • 2Warrender C, Forrest S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, 1999
  • 3Jha S, et al. Classifiers, and Intrusion Detection. In: 14th IEEE Computer Security Foundations Workshop(CSFW'01),June 2001
  • 4Gao B, et al (HMMS (HIDDEN MARKOV CHAIN MODELS)BASED ON ANOMALY INTRUSION DETECTION METHOD.In: Proc. of the First Conf. on Machine Learning and Cybernetics, Beijing, Nov. 2002. 381-385
  • 5Bykova M, Ostermann S, Tjaden B. Detecting Network Intrusions via Statistical Analysis of Network Packet Characteristics.In: Proc. of the 33rd southeastern Symposium on System Theory,2001
  • 6Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. In: Proc. of the 7th USENIX Security Symposium San Antonio, Texas, Jan. 1998
  • 7Postel J. Transmission Control Protocol. RFC 793, Sep. 1981

同被引文献58

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部