期刊文献+

用扩展巴科斯范式优化决策树协议解码技术 被引量:2

Optimizing Decision Tree-Based Protocol Decoding with Extended Backus-Naur Form
在线阅读 下载PDF
导出
摘要 基于规则的入侵检测系统中存在误报、漏报率高,检测速度慢等问题,为此在协议分析的基础上,提出一种基于决策树的协议解码方法。该方法使用扩展巴科斯范式描述检测规则,给出推理规则的定义;提出构造最优决策树和增量决策树的算法;通过构造基于决策树的入侵检测系统,将该方法与简单模式匹配,与基于动态规则集、基于状态转换两种协议解码方法进行了比较。实验结果表明:基于扩展巴科斯范式的协议解码方法,在误报率方面比其他3种方法分别降低10.08%,0.1%,1.51%;在漏报率方面分别降低15.56%,3.68%,2.86%。 Nowadays, intrusion detection system is still facing the problem of high false positive, high false negative and slow detection speed. In order to solve these problems, it gives an inference system using extended Backus-Naur Form to deal with these problems and provides a best decision tree algorithm and an incremental de- cision tree algorithm. The third section constructs DT (Decision Tree) -based Intrusion detection system and compares the improved method with traditional pattern match, dynamic rule sets-based method and state transition-based method. In the final part, it draws a conclusion that intrusion detection performance can be highly im- proved using the optimization decision tree method with the decrease by 10. 08%, 0. 1% and 1.51% respectively for false positive; the decrease by 15.56%, 3.68% and 2. 86% respectively for false negative.
作者 谷勇浩 刘勇
出处 《吉林大学学报(信息科学版)》 CAS 2007年第1期12-17,共6页 Journal of Jilin University(Information Science Edition)
基金 国家自然科学基金资助项目(60372094)
关键词 决策树 协议解码 扩展巴科斯范式 最优决策树 增量决策树 decision tree (DT) protocol decoding extended backus-naur form best DT incremental DT
  • 相关文献

参考文献13

二级参考文献68

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994

共引文献77

同被引文献9

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部