期刊文献+

基于隐马尔可夫模型的网络状态分析方法

An Network Analyzing Method Based on Hidden Markov Model
在线阅读 下载PDF
导出
摘要 针对数据过滤问题提出了一种网络状态分析方法,该方法从恶意数据流中提取二维特征,经过数值加权把这二维特征整合为观测数据,建立了一个对恶意数据流敏感的隐马尔可夫模型,最后以各种网络数据集为例对其应用情况进行了分析。 At present, the network-based intrusion detection systems generally directly processes the network data stream. The malicious traffic in network usually occupies the flux lower than 1 %. Facing the data ocean in network, how the NIDS to filter the data is an important problem. This article proposes the network state analysis method in view of data filtration question. This method extracts the two-dimensional feature from the malicious data stream, creates the observation data by numerically weighting for the two-dimensional feature, establishes a hidden Markov model which is sensitive to the malicious data stream. Finally it takes each kind of network data set as example to analyze their application situation.
出处 《山西电子技术》 2009年第4期61-63,共3页 Shanxi Electronic Technology
关键词 网络安全 数据包过滤 隐马尔可夫模型 状态分析 aetwork security packet filtering, HMM NIDS network status analysis
  • 相关文献

参考文献6

二级参考文献54

  • 1向尕,曹元大.一种面向检测的攻击分类方法及在IDS中的应用[J].计算机工程,2004,30(11):94-95. 被引量:3
  • 2杨德刚.基于模糊C均值聚类的网络入侵检测算法[J].计算机科学,2005,32(1):86-87. 被引量:26
  • 3张虹,蔡焕夫,高平安,赵国红.入侵检测系统匹配规则的研究[J].微计算机信息,2006,22(11X):120-122. 被引量:6
  • 4马占飞,郑雪峰.基于计算机网络的入侵检测系统的研究[J].微计算机信息,2006(12X):34-36. 被引量:8
  • 5Russell D,Gangemig.Computer Security Basics[M].O'Reilly & Associates,Inc,1991
  • 6Howard J.An Analysis of Security Incidents on the Internet[D].USA:Carnegie Mellon University,1997
  • 7Haines J,Lippmann R,Fried D,et al.1999 Darpa Intrusion Detection Evaluation:Design and Procedures[R].MIT Lincoln Laboratory,USA,2001
  • 8Mirkovic J,Martin J,Reiher P.A Taxonomy of DDOS Attacks & DDOS Defense Mechanisms[R].University of California,2002
  • 9Kumar S.Classification and Detection of Computer Intrusions[Ph d Dissertation]Purdue University,West LAfayette,USA,1995.ftp://oast ca Purdue.Edu/pubCOAST/papers/sandeepkumar/kumar-intdet-phddiss ps.Z
  • 10Lippmann R P, Fried D J, Graf I, et al. Evaluating Intrusion Detection Systems.. The 1998 DARPA Off-Line Intrusion Detection Evaluation. In:Proc. of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), Los Alamitos, CA, 2000,2:12-26

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部