期刊文献+

基于统计方法的入侵检测模型 被引量:1

A model of statistics-based intrusion detection
在线阅读 下载PDF
导出
摘要 <Abstrcat> <Abstrcat>
出处 《上海水产大学学报》 CSCD 北大核心 2005年第2期220-224,共5页 Journal of Shanghai Fisheries University
关键词 入侵检测 会话向量 伯努利向量 疑义商 intrusion detection session vector bernoulli vector suspicion quotient
  • 相关文献

参考文献7

  • 1马锐,刘玉树,杜彦辉.基于神经网络专家系统的入侵检测方法[J].计算机工程与应用,2004,40(2):151-153. 被引量:2
  • 2胡敏,潘雪增,平玲娣.基于数据挖掘的实时入侵检测技术的研究[J].计算机应用研究,2004,21(1):105-108. 被引量:8
  • 3Fabio Gonzalez.Dipankar Dasgupta. Neuro-lmmune and Self-Organizing Map Approaches to Anomaly Detection:A Comparison[A]. The Proceedings of the 1st International Conference on Artificial Immune System[C], 2002, (19):101 - 103.
  • 4Aurobindo Sundaram. An Introduction to Intrusion Detection[R], 1996, 40( 1 ) : 17 - 21.
  • 5戴葵(译).神经网络设计[M].北京:机械工业出版社,2002,9..
  • 6Biswanath Mukherjee,L Todd Heberlein,Karl N Levitt.Network Intrusion Detection[J].IEEE NetWork,1994,5(2):42—47.
  • 7Smaha S E.HayStack:An Intrusion Detection System[A],Proc.IEEE 4th Aerospace Computer Security Conference[C].Orlando,FL,1988,17(1):70—73.

二级参考文献14

  • 1[1]K IIgun,et al. State Transition Analysis: A Rule-based Intrusion Detection Approach [ J ]. IEEE Transactions on Software Engineering, 1995,21(3): 181-199.
  • 2[2]S Kumar, et al. A Software Architecture to Support Misuse Instrustion Detection [ C ]. Proceeding of the 18th National Information Security Conference, 1995. 194-204.
  • 3[3]W Lee, et al. Data Mining in Work Flow Environment: Experience in Intrusion Detection[C]. Proceedings of the Conference on Knowledge Discovery and Data Mining( KDD-99), 1999.
  • 4[4]A Ghosh, et al. A Study in Using Neural Networks for Anomaly and Misuse Detecion[C]. In Proceedings of the Eighth USENIX Security Symposium, 1999.
  • 5[5]C Warrender, et al. Detecting Intrusions Using System Calls:Alternative Data Models[ C]. 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1999. 133-145.
  • 6[6]V Barnett,T Lewis. Outliers in Statistical Data[M]. John Wiley and Sons, 1994.
  • 7[7]E Eskin. Signal Detection over Noisy Data Using Learned Probability Distributions [ C ]. Proceeding of the Seventeenth International Confere on Machine Learning(ICML-2000) ,2000.
  • 8[8]W Fan. Cost-senstive, Scalable and Adaptive Learning Using Ensemblebased Methods [ D]. PhD thesis, Columbia University,2001.
  • 9[9]W Fan, et al. A Multiple Model Approach for Cost-sensitive Intrusion Detection [ C ]. Proc 2000 European Conference on Machine Learning, Barcelona, Spain, 2000.
  • 10[10]R Lippmann, et al. Evaluation Intrusion Detection Systems: The 1998 Darpa Off-line Intrusion Detection Evaluation [ C ].Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000.

共引文献9

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部