微波EDA网,见证研发工程师的成长!
首页 > 射频和无线通信 > 射频无线通信文库 > 一种新的基于数据挖掘技术的异常入侵检测系统研

一种新的基于数据挖掘技术的异常入侵检测系统研

时间:10-18 来源:互联网 点击:

参考文献
[1] VERWORD T,HUNT R. Intrusion detection techniques and approaches[J].Computer Communication,2002,25(15): 1356.1365.
[2] LANE T. Machine learning techniques for the computer security domain of anomaly detection[D]. Purdue University,2000.
[3] MUKKAMALA S, SUNG A H,ABRAHAM A. Intrusion detection using all ensemble of intelligent paradigms[J].Journal of Network and Computer Application,2005,28(2):167-182.
[4] 吕志军,袁卫忠,仲海骏,等. 基于数据挖掘的异常入侵检测系统研究[J].计算机科学,2004,31(10):61-65.
[5] 田新广,李文法,段σ,等. 基于数据挖掘和变长序列模式匹配的程序行为异常检测[J].信号处理,2008,24(4):521-555.
[6] 凌军,曹阳,尹建华,等. 基于时态知识模型的网络入侵检测方法研究[J].计算机学报,2003,26(11):1591-1597.
[7] 杨向荣,宋擒豹,沈钧毅,等. 基于数据挖掘的智能化入侵检测系统[J].计算机工程,2001,27(9):17-102.
[8] BARFORD P,HIINE J,PLONKA D,et al. A signal analysis of network traffic anomalies[J].Internet Measurement Workshop,2002,7:1-82.
[9] YE N, LI Xiang Yatig,CHEN Qiang. Probabilistic techniques for intrusion detection based on computer audit data[J]. Man and Cybernetics,Part A,IEEE Transactions on 2001:31(4):266-274.
[10] YE N,EMRAN S M,CHEN Q, et a1. Multivariate statistical analysis of audit trails for host-based intrusion detection[J].IEEE Transactions on Computers,2002,51(7):810-820.
[11] OH S H,LEE W. A clustering based anomaly intrusion detection for a host computer[J].IEICE Transactions on In.formation and Systems,2004,E87-D(8):2086-2094.
[12] HOFMEYR S A,FORREST S,SOMAYAJI A. Intrusion detection using sequences of system calls[J]. Journal of Computer Security,1998(6):151-180.
[13] LANE T,CARLA E B. An empirical study of two approaches to sequence learning for anomaly detection[J].Machine Learning,2003,51(1):73-107.

Copyright © 2017-2020 微波EDA网 版权所有

网站地图

Top