首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
入侵检测系统(IDS)在近二十年来成为一个非常活跃的研究和应用领域。同传统的操作系统加固技术和防火墙隔离技术等静态安全防御技术相比,IDS作为核心动态安全技术之一,通过分析、审计记录,识别系统中任何不应该发生的活动,做出记录、报警、阻断等相应的措施来报告、制止入侵活动,从而提供实时的入侵检测。 IDS按获得原始数据的方法,可以分为基于主机和基于网络的入侵检测系统。基于主机的入侵检测系统HIDS是早期的入侵检测系统结构,使用主机传感器采集本系统的信息,可以用于分部  相似文献   

2.
本文提出一种基于模糊规则集的入侵检测模型FR-IDM (Fuzzy Rule-based Intrusion Detection Model),该模型采用模糊规则的表示形式来描述入侵检测知识,在此基础上建立基于模糊规则集的入侵检测模型,然后根据入侵检测信息符合前提的真度和模糊产生式的置信度,计算出该结论的可信度,根据一个激活阀值来决定是否激活该产生式。  相似文献   

3.
孟杰  陈行  薛俊  陶军 《计算机技术与发展》2009,19(9):146-149,167
提出一种新颖的基于服务特征分析的入侵检测方法.在处理网络审计数据时,首先针对网络服务进行特征分析,将审计数据按照网络应用进行区分,然后使用统计方差模型对应用区分后的审计数据进行检测;另外,在传统的统计方差模型基础上,提出加权的方法调整可信区间,提高检测率.选用KDDCup 1999 Data网络连接数据集进行实验,基于服务特征分析与统计的入侵检测方法在不增加虚警率的情况下,可以得到更高的检测精度.结果说明,该方法是行之有效的.  相似文献   

4.
针对审计日志记录的特性,本文提出了一种基于聚集信息矩阵的高效增量式关联规则的挖掘算法,并解决了当最小支持度改变以及审计数据动态更新时相应的关联规则的更新问题。算法提高了审计日志数据库关联规则挖掘的效率,更加适用于入侵检测系统,能基本满足实时入侵检测系统的需要。  相似文献   

5.
基于数据挖掘的实时入侵检测技术的研究   总被引:3,自引:0,他引:3  
探讨了实时环境下运用基于数据挖掘技术的入侵检测系统,针对传统入侵检测系统的局限性,就正确度、效率以及可用性三方面的问题提出了相应的解决办法,可以在保证正确度的情况下又能同时提高效率,并采用提出的方法开发了一个基于数据挖掘的实时入侵检测系统,使得共享和存储审计数据以及发布全新或更新模型变得容易,同时也提高了IDS的效率和可扩展性。  相似文献   

6.
通常在网络检测入侵信息时,存在检测精度低、检测效果差的问题。对此,提出基于物联网技术构建医院网络自动防入侵模型。查找及插补医院网络数据缺失值,基于物联网技术结合Z-Score法标准化处理插补过的数据;依据主分量分析法计算标准化数据,获取医院网络数据的线性特征;结合支持向量机原理构建医院网络的自动防入侵架构,将获取的线性特征放入模型中,实现医院网络自动防入侵。实验结果表明,运用该方法可以有效检测出网络入侵数据分布,该模型的检测精度高、检测效果好。  相似文献   

7.
基于蜜罐技术的局域网安全研究   总被引:1,自引:0,他引:1  
蜜罐技术是一种主动防御技术,可以诱骗攻击并记录入侵过程,及时获得攻击信息并以此来深入分析各种攻击行为。本文根据蜜罐技术的原理,结合传统的入侵检测技术设计了一个基于蜜罐技术的局域网安全模型。  相似文献   

8.
范荣真  杨东勇 《福建电脑》2010,26(4):1-2,15
在前人提出的基于人工免疫的入侵检测模型的基础上,加入了抗体精度匹配阀值和粗糙匹配频度阀值以改进其算法中对于self/nonself的判断处理方法,使得对于正常的突发性网络事件也可以进行合理的判断,从而加强了对网络事件检测的灵活性,并提出了改进后的入侵检测与防御体系模型。最后通过仿真测试,证明本模型在对突发性网络事件判断的灵活性、合理性和可行性,优于前人的基于人工免疫的入侵检测模型。  相似文献   

9.
基于Agent技术的入侵检测系统设计与实现   总被引:2,自引:1,他引:2  
在网络环境下入侵行为开始之前需要获取目标的必要信息,为入侵活动做准备,这就是网络中的早期异常活动。介绍的入侵检测系统是基于Agent技术,具有层次化.模块化的结构,在网络中易于部署,不仅可以检测基于知识的入侵,还可以检测基于行为的入侵,能够对早期的异常活动进行有效的报警和记录。  相似文献   

10.
入侵检测中对系统日志审计信息进行数据挖掘的研究   总被引:16,自引:0,他引:16  
入侵检测系统是用来检测网络入侵行为的工具,入侵检测系统的关键在于其安全模式规则的准确性,网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息,入侵检测系统可以从日志审计数据中提取安全模式规则,但由于这些日志审计数据量非常庞大,因此采用数据挖掘技术从中进行安全模式规则的提取,研究了如何在入侵检测中对系统日志审计信息进行数据挖掘,提出了全套的步骤,并重点论述了采用轴属对日志审计信息进行特征提取。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

18.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

19.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

20.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号