基于机器学习方法的入侵检测技术的研究

 万方数据

 万方数据

 万方数据

 万方数据

基于机器学习方法的入侵检测技术的研究

作者:邓安远, DENG An-Yuan

作者单位:九江学院信息科学与技术学院,江西九江,332005

刊名:

计算机科学

英文刊名:COMPUTER SCIENCE

年,卷(期):2008,35(1)

被引用次数:1次

参考文献(25条)

1.Denning D E An Intrusion-Detection Model 1987

2.Anderson Computer Security Threat Monitoring and Surveil-lance 1980

3.Barbara D;Wu N;Jajodia S Detecting Novel Network Intru-sions Using Bayes Estimators 2001

4.Valdes A;Skinner K Adaptive,Model-based Monitoring for Cy-her Attack Detection 2000

5.Roesch M Snort:Lightweight Intrusion Detection for Net-works 1999

6.Boyer R S;Moore J S A Fast String Searching Algorithm[外文期刊] 1977

7.Porras P A;Neumann P G EMERALD:Event monitoring enab-ling responses to anomalous live disturbances 1997

8.Kumar S;Spafford E H A pattern matching model for misuse in-trusion detection 1994

9.Chen S S;Cheung S;Crawford R GrIDS-A Graph Based Intru-sion Detection System for Large Networks 1996

10.Kim D;Nguyen H;Park J Genetic Algorithm to Improve SVM Based Network Intrusion Detection System [外文会议] 2005

11.Yang W;Yun X;Li J An improved Network Intrusion Detection Method based on VQ-SVM[外文会议] 2005

12.Sung A H;Mukkamala S Identifying Important Features for In-trusion Detection Using Support Vector Machines and Neural Networks[外文会议] 2003

13.Mukkamala S;Janoski G;Sung A H Intrusion Detection Using Neural Networks and Support Vector Machines[外文会议] 2002

14.Vapnik V N Statistical learning theory.Adaptive and learning systems for signal

processing,communications and control 1998

15.Lee Wenke;Stolfo S J Data Mining Approaches for Intrusion Detection 1998

16.Agrawal R;Srikant R Fast algorithms for mining association rules 1994

17.Portnoy L;Eskin E;Stolfo S J Intrusion Detection with Unla-beled Data Using Clustering 2001

18.Han Jiawei;Karaber M Data Mining:Concepts and Techniques 2001

19.Wenke Lee;Stolfo S J;Mok K W A Data Mining Framework for Building Intrusion Detection Models[外文会议] 1999

20.Ghosh A K;Schwartzbard A A Study in Using Neural Network for Anomaly and Misuse Detection 1999

21.Fox K;Henning R;Reed J A Neural Network Approach To-wards Intrusion Detection 1990

22.Kruegel C;Mutz D;Roberston W;Valeur F Bayesian Event Classification for Intrusion Detection 2003

23.Bate R;Mell P NIST Special Publication on Intrusion Detection Systems 2001

https://www.360docs.net/doc/6211875727.html,mon Intrusion Detection Framework Working Group Com-mon Intrusion Detection Framework

Specification 2000

25.Heberlein L T;Dias G;Levitt K;Mukherjee B,Wood J,Wolber D A Netork Security Monitor 1990引证文献(1条)

1.汪世义.陶亮.王华彬几种机器学习方法在IDS中的性能比较[期刊论文]-计算机仿真 2010(8)

本文链接:https://www.360docs.net/doc/6211875727.html,/Periodical_jsjkx200801025.aspx

相关文档
最新文档