期刊文献+

基于神经网络模型分割的入侵检测方法 被引量:1

Method of IDS based on neural network division
在线阅读 下载PDF
导出
摘要 针对神经网络在入侵检测应用中存在资源消耗大、学习效率低等不足,提出一种基于神经网络模型分割的入侵检测方法。该方法根据当前典型攻击的特征,为每类攻击分别建立独立的子神经网络,对该类攻击进行学习和检测。然后再将每个子神经网络分割成多个更小的子模型,来降低学习时间和减少神经网络各层之间的连接权数目。设计了相应算法并进行仿真实验。实验结果表明,提出的方法提高了入侵检测的速度,降低了系统资源的消耗,提高了检测率。 To reduce resource consumption, rise speed oftraining and testing, a new method oflDS based on division ofNN is proposed. The NN is divided into several small-scale neural networks according to the characteristic of the intrusion to perform learning and detecting this intrusion. In order to rise the speed of training and testing and to reduce the number of weights, every sub-neural network is divided into several smaller models. The detecting algorithm is developed and simulation is performed. The experimental results demonstrate that this method has the merit of fast learning and lower consumption of system resources, this method also improve the detection rate.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第22期5082-5086,共5页 Computer Engineering and Design
基金 湖南省科技基金项目(2006GK3085)
关键词 入侵检测 神经网络 子神经网络 模型分割 检测率 intrusion detection system neural network sub neural network model division detecting rate
  • 相关文献

参考文献5

二级参考文献81

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2刘理争,柴乔林.基于神经网络与证据理论的入侵检测系统[J].计算机工程与设计,2005,26(3):697-698. 被引量:6
  • 3Anderson, James P. Computer security threat monitoring and surveillance [EB/OL]. http://csrc.nist.gov/publications/history/ande80.pdf.
  • 4Denning, Dorothy E. An intrusion detection model [J]. IEEE Transaction on Software Engineer on Software Engineering,1987, SE-13(2):222-232.
  • 5Frank, Jeremy. Artificial intelligence and intrusion detection:Current and future directions[C]. Proceedings of the 17th National Computer Security Conference, 1994.
  • 6Cannady J. Artificial neural networks for misuse detection[C].Proceedings of the 1998 National Information Systems Security Conference(NISSC'98), Arlington VA, 1998.443-456.
  • 7Common intrusion detection framework[EB/OL].http://www.isi.edu/gost/cidf/.
  • 8Debar H, Dacier M, Wespi A. Toward a taxonomy of intrusion-detection systems. Computer Networks, 1999,31(8):805-822.
  • 9Ye N, Li XY, Chen Q, Emran SM, Xu MM. Probabilistic techniques for intrusion detection based on computer audit data IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2001,31(4):266-274.
  • 10Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs byexecution monitoring. In: Proc. of the 10th Annual Computer Security Applications Conf Orlando: IEEE Computer Society Press 1994. 134~144.

共引文献270

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部