一种新的基于数据挖掘技术的异常入侵检测系统研
参考文献
[1] VERWORD T,HUNT R. Intrusion detection techniques and approaches[J].Computer Communication,2002,25(15): 1356.1365.
[2] LANE T. Machine learning techniques for the computer security domain of anomaly detection[D]. Purdue University,2000.
[3] MUKKAMALA S, SUNG A H,ABRAHAM A. Intrusion detection using all ensemble of intelligent paradigms[J].Journal of Network and Computer Application,2005,28(2):167-182.
[4] 吕志军,袁卫忠,仲海骏,等. 基于数据挖掘的异常入侵检测系统研究[J].计算机科学,2004,31(10):61-65.
[5] 田新广,李文法,段σ,等. 基于数据挖掘和变长序列模式匹配的程序行为异常检测[J].信号处理,2008,24(4):521-555.
[6] 凌军,曹阳,尹建华,等. 基于时态知识模型的网络入侵检测方法研究[J].计算机学报,2003,26(11):1591-1597.
[7] 杨向荣,宋擒豹,沈钧毅,等. 基于数据挖掘的智能化入侵检测系统[J].计算机工程,2001,27(9):17-102.
[8] BARFORD P,HIINE J,PLONKA D,et al. A signal analysis of network traffic anomalies[J].Internet Measurement Workshop,2002,7:1-82.
[9] YE N, LI Xiang Yatig,CHEN Qiang. Probabilistic techniques for intrusion detection based on computer audit data[J]. Man and Cybernetics,Part A,IEEE Transactions on 2001:31(4):266-274.
[10] YE N,EMRAN S M,CHEN Q, et a1. Multivariate statistical analysis of audit trails for host-based intrusion detection[J].IEEE Transactions on Computers,2002,51(7):810-820.
[11] OH S H,LEE W. A clustering based anomaly intrusion detection for a host computer[J].IEICE Transactions on In.formation and Systems,2004,E87-D(8):2086-2094.
[12] HOFMEYR S A,FORREST S,SOMAYAJI A. Intrusion detection using sequences of system calls[J]. Journal of Computer Security,1998(6):151-180.
[13] LANE T,CARLA E B. An empirical study of two approaches to sequence learning for anomaly detection[J].Machine Learning,2003,51(1):73-107.
- 入侵检测系统(IDS)和入侵防御系统(IPS)(09-04)
- 无线入侵检测及时呈现无线网络安全真相(06-20)
- 基于IPv6的动态网络入侵检测系统的研究与设计(02-16)
- 基于网络引擎入侵检测系统的研究与实现(08-01)
- 模式匹配算法在入侵检测中的应用(04-24)
- 测量电压驻波比量化传输线的阻抗失配(08-22)