期刊文献+

CBR技术在网络入侵检测系统中的应用 被引量:2

Application of CBR in network-based IDS
在线阅读 下载PDF
导出
摘要 针对基于RBR技术的网络入侵检测系统中存在的误报和漏报问题,提出一种基于CBR技术的网络入侵检测系统构建方法,并对系统实现中的关键问题进行分析研究,包括系统结构设计,入侵案例的表示,案例检索与匹配等,最后采用实验数据对系统进行测试并给出结果。 Aimed at The false alarms and high detection failures based on RBR technique, a new NIDS based on CBR technique is put forward. In the mean time, key issues regarding the realization of the system is analyzed and studied, including the construction and design of the system, the representation of intrusion cases, as well as case indexing and matching, etc. Finally, the system is tested by adopting the experiment data, and the result is given.
作者 戴成强 彭宏
出处 《计算机工程与设计》 CSCD 北大核心 2007年第8期1795-1797,共3页 Computer Engineering and Design
基金 广东省科技攻关基金项目(B10101033 A10202001) 广州市科技攻关基金项目(2006Z3-D3051)
关键词 案例推理 规则推理 网络入侵检测 案例表示 案例改写 case-based reasoning role-based reasoning network intrusion detection case representation case revise
  • 相关文献

参考文献9

二级参考文献30

  • 1徐明,胡守仁.论CBR研究中的若干误区[J].微电子学与计算机,1994,11(5):28-30. 被引量:4
  • 2吴焱.入侵者检测[M].北京:电子工业出版社,1999..
  • 3唐正军.网络入侵检测系统的研究与实现[M].北京:电子工业出版社,..
  • 4Biswanath Mukherjee. Network intrusion dtection [J].IEEE Network, 1994.26-38.
  • 5范建华.TCP/IP详解—卷1:协议[M].北京:机械工业出版社,2000..
  • 6Protocol analysis and command parsing vs.pattem maching in intrusion detection system[EB/OL]. 2000.Http://www. network-ice.com.products/ocumentation.html.
  • 7Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 8Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 9Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 10Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.

共引文献108

同被引文献10

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2曾茹刚,管晓宏,昝鑫,郑庆华.基于案例推理的入侵检测关联分析研究[J].计算机工程与应用,2006,42(4):138-141. 被引量:2
  • 3Esmaili M, Balaehandran B, Safavi-Naini R, et al. Case-Based Reasoning for Intrusion Detection[ C]//The 12th Annual Computer Security Applications Conference. 1996:214-222.
  • 4Qian Quan, Zhang Rui, Che Hong-Yi. Object-oriented Case Representation and Its Application in IDS [ C ]//2009 Eigth IEEE/ACIS International Conference on Computer and Information Science. 2009,10:301-306.
  • 5Rabia Alil, Maleeha Ather. Clustering Based Deletion Policy for Case-base Maintenance[ C ]//The 6th International Conference on Emerging Technologies ( ICET). 2010:45-48.
  • 6Diego P, Estevam R,Hruschka Jr,et al. Feature-weighted k-Nearest Neighbor Classifierl C ]//The IEEE Symposium on Foundations of Computational Intelligence ( FOCI 2007 ). 2007:481-486.
  • 7Qian Quan,Zhang Rui,Che Hong-Yi. Obje-ct-oriented Case Representation and Its App-lication in IDS[A].2011.301-306.
  • 8胡昌振.网络入侵检测原理与技术[M]北京:北京理工大学出版社,2010.
  • 9黄浙京,刘永军,张建辉,贺磊.基于CBR技术的入侵检测系统研究[J].信息工程大学学报,2011,12(3):363-368. 被引量:1
  • 10高苗粉,秦勇,李勇,邹裕,李清霞,申林.网络入侵检测系统自体集检测中的概率匹配高效寻优机制[J].计算机应用,2013,33(1):156-159. 被引量:10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部