期刊文献+

用神经网络驱动的模糊推理入侵检测方法 被引量:3

Intrusion Detection Method Based on Fuzzy Reasoning Drived by Neural Network
在线阅读 下载PDF
导出
摘要 提出了神经网络驱动模糊推理的入侵检测方法,利用神经网络的学习能力,对不清楚规则的复杂系统的输入输出特性进行适当的非线性划分,自动形成规则集和相应的隶属关系,克服了在多维空间上经验性的确定隶属函数的困难。对于神经网络的训练数据,采用人工数据,克服了神经网络监督学习和获取已知输出的训练数据的困难。试验证明,这种技术具有很好的灵敏度和鲁棒性,而且,能够检测出未知的入侵行为。 This paper describes a novel intrusion detection method based on fuzzy reasoning drived by neural network (NN). In order to overcome the difficulty of specifying the membership functions of rules depending on experiences of experts in multi-dimension space, neural network is introduced to distinguish non-linearly input/output characteristics of complex system and to generate rule sets and membership functions automatically. The NNs in this experiment are trained using data generated artificially, eliminating both problems, which are the facts that A BP NN is initialized randomly and must undergo' supervised learning' before being used as a detector and that obtaining training data with knowledge of the desired output for each input vector. The technique demonstrated in this experiment appears to be sensitive and robust, moreover, which is able to detect unknown attack and plays down false alarms and missing alarms.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第19期133-135,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(863-301-05-03)
关键词 神经网络 模糊推理 入侵检测 Neural network Fuzzy reasoning Intrusion detection
  • 相关文献

参考文献1

  • 1BaceRG.Intrusion Detection[M].北京:人民邮电出版社,2001.56-72.

同被引文献20

  • 1郭大伟,安宁.入侵容忍系统设计[J].计算机工程与应用,2005,41(29):134-136. 被引量:1
  • 2王永全.通信网络中犯罪行为的取证技术[J].电信科学,2006,22(6):63-66. 被引量:4
  • 3Anderson J P. Computer Security threat monitoring and surveillance[R]. Technology Report, James P Anderson Co., Fort Washington, Pennsylvanin, 1980.
  • 4Canndy J. Artificial neural network for misuse detection[J]. Proceeding of the 1998 National Information System Security Conference (NI-SSC' 98), 1998, (10): 5-8: 443-456.
  • 5Steven A H. An immunological model of distributed detectionand its application to computer security[D]. [s.l]: University of New Mexico, 1999.
  • 6Wenke Lee, Stolfo S J, Mok K W. A Data Mining Framework for Building Intrusion Detection Model[C]. Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.
  • 7Pawlak Z. Vagueness and uneertainty-a rough set perspective [J]. Computational Intelligence, 1995, 11 (2): 227-232.
  • 8LIU Min, LING Yean-yng. Using Fuzzy Neural Network Approach to Estimate Contractor'sMarkup [ J ]. Building and Enviroment ,2003,38 : 1303 -1308.
  • 9John Chiriilo著,万静,胡春华等译.黑客攻击揭秘篇[M].北京:机械工业出版社,2003.
  • 10李家春,李之棠.神经模糊入侵检测系统的研究[J].计算机工程与应用,2001,37(17):37-38. 被引量:17

引证文献3

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部