首页 | 本学科首页   官方微博 | 高级检索  
     

基于粗糙集理论的入侵检测新方法
引用本文:蔡忠闽,管晓宏,邵萍,彭勤科,孙国基.基于粗糙集理论的入侵检测新方法[J].计算机学报,2003,26(3):361-366.
作者姓名:蔡忠闽  管晓宏  邵萍  彭勤科  孙国基
作者单位:西安交通大学系统工程研究所网络化系统与信息安全研究中心,西安,710049
基金项目:国家杰出青年基金 ( 6970 0 2 5 ),国家“八六三”高技术研究发展计划项目( 2 0 0 1AA14 0 2 13 ),国家自然科学基金 ( 70 1710 2 9,60 2 43 0 0 1),西安交通大学博士论文基金资助
摘    要:提出了一种高效低负荷的异常检测方法,用于监控进程的非正常行为,该方法借助于粗糙集理论从进程正常运行情况下产生的系统调用序列中提取出一个简单的预测规则模型,能有效地检测了进程的异常运行状态,同其它方法相比,用粗糙集建立正常模型要求的训练数据获取简单,而且得到的模型更适用于在线检测,实验结果表明,该方法的检测效果优于同类的其它方法。

关 键 词:粗糙集理论  入侵检测  异常检测  网络安全  系统调用  防火墙  计算机网络  信息安全
修稿时间:2002年3月24日

A New Approach to Intrusion Detection Based on Rough Set Theory
CAI Zhong,Min,GUAN Xiao,Hong,SHAO Ping,PENG Qin,Ke,SUN Guo,Ji.A New Approach to Intrusion Detection Based on Rough Set Theory[J].Chinese Journal of Computers,2003,26(3):361-366.
Authors:CAI Zhong  Min  GUAN Xiao  Hong  SHAO Ping  PENG Qin  Ke  SUN Guo  Ji
Abstract:Intrusion detection is important in the defense in depth network security framework and a hot topic in computer network security in recent years. In this paper, an effective method for anomaly intrusion detection with low overhead and high efficiency is presented and applied to monitor the abnormal behavior of processes. The method is based on rough set theory and capable of extracting a set of detection rules with the minimum size to form a normal behavior model from the record of system call sequences generated during the normal execution of a process. It will detect the abnormal operating status of a process and thus report a possible intrusion. The normal behavior model in terms of the sequences of system calls is first defined and how to apply the rough set theory as a powerful data mining tool to establish the model is discussed by examples. The anomaly detection algorithm based on rough set theory is given in the paper. Compared with other methods, this method requires a smaller size of training data set, less efforts to collect training data and more suitable for real time detection. Experimental results show that this method is better than other methods reported in the literature in terms of detection resolution, required training data set and implementation for real time detection.
Keywords:intrusion detection  anomaly detection  network security  rough set theory  system call
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号