首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
研究网络安全态势准确评估问题.当前网络安全态势评估没有考虑不同时段入侵后网络的变化因素,以入侵前后相同静态固定指标评估为主,缺少不同时段内动态可持续评估的方法.为提高准确性,提出基于差分进化的网络安全态势动态评估方法.在网络安全特征提取的过程中,将网络安全特征与异常特征进行对比,并对网络安全特征进行加权运算,计算特征提取误差,完成网络安全特征提取.根据差分进化相关理论,搜索网络安全变异个体,并且对原始个体和变异个体进行交叉操作,获取新的种群,实现网络安全态势评估.实验结果表明,利用改进算法进行网络安全态势评估,能够极大的提高评估的准确性.  相似文献   

2.
入侵检测建模过程中特征提取最优化评估   总被引:2,自引:0,他引:2  
胡威  李建华  陈波 《计算机工程》2006,32(12):150-151,168
在入侵检测建模过程中,特征提取是一个重要的步骤。特征提取有利干提高入侵检测的效率和准确性,好的特征可以在特征空间提供完美的分类独立性。但在以往的入侵检测模型评估中,对原始数据的特征提取并没有涉及提取的标准和原则。文章利用KDD数据集,针对不同种类的网络入侵攻击,使用经典聚类算法对特征提取的特征类别进行比较,以获取该领域的知识。  相似文献   

3.
针对传统模糊特征检测方法存在的效率低、精度不高等问题,设计了一种新的网络安全防护态势优化模型;对网络安全状态分布进行建模,并利用数据挖掘技术对网络信息进行挖掘;利用新型入侵识别检测方法对所设计的网络安全估计状态进行自适应特征提取,提取网络安全状况的特征数据集和处理单元;采用模糊C平均数据聚类方法(FCM)提取综合信息;对入侵特征信息流进行分类,根据属性分类结果进行网络安全态势预测,实现安全态势评估;基于不同场景下进行实验,结果表明,所提算法适用于网络安全的场景,准确性和鲁棒性都得到了验证。  相似文献   

4.
网络入侵特征优化检测方法仿真   总被引:1,自引:0,他引:1  
网络入侵特征的伪装程度越来越高,使得入侵特征与正常数据特征在分类效果上的倾斜度越来越接近.传统的采用特征分类的入侵检测方法对训练入侵特征数据集的最佳类分布未知,都是假定误分类代价均等,只注重分类的精度敏感,忽视了类型间的区别,造成入侵检测不准.提出了一种敏感性数据挖掘的网络入侵特征检测算法.利用主成分分析方法,提取网络操作数据中的主成分,去除冗余数据,将网络入侵特征的敏感性引入到检测过程中,利用敏感性数据挖掘方法,获取网络操作数据中的恶意入侵操作行为的特征,从而完成网络入侵特征检测.实验结果表明,利用改进算法进行网络入侵特征优化检测,能够准确获取网络操作行为中的异常特征.  相似文献   

5.
针对网络异常检测方法难以对新型入侵提供更多有用信息的缺点,提出一种面向新型入侵的获取和分类方法.首先,为了改善整体检测性能,提出一种改进的特征提取算法并将其与两种特征提取方法共同构成特征集成方法进行异常检测以捕获入侵.然后通过一种匹配过滤机制筛除已知入侵,最后将获取的新型入侵作为聚类模块的输入,通过聚类及提出的类别获取算法对新型入侵做进一步分类匹配,从而获得其类别信息.最后,采用KⅪCUP99数据集进行实验仿真,结果表明该检测方法具有较好的检测率和较低的误报率,并且试方法对于识别并分类新型入侵是有效的.  相似文献   

6.
为了提高无线动态压缩感知网络的入侵检测能力,提出一种基于多层交叉熵的网络入侵数据自主防御系统设计方法,构建网络入侵数据检测方法,采用大数据挖掘技术进行无线动态压缩感知网络的入侵大数据挖掘,对挖掘的入侵数据采用频谱超分辨识别方法进行特征提取,构建无线动态压缩感知网络入侵检测的动态多层数据分布结构模型,采用关联映射方法进行网络入侵数据的信号结构重组,结合模糊自适应调度方法进行入侵数据的多层交叉熵调度,根据入侵数据的异常性特征分布实现自主检测和入侵特征定位。采用嵌入式的Linux开发工具进行网络入侵数据自主防御系统设计,结合程序加载和交叉编译实现入侵检测算法的自动读写和检测输出。测试结果表明,采用该方法进行网络入侵数据自主防御系统设计,提高了对入侵数据的检测主动性和准确性,从而提高了网络安全性。  相似文献   

7.
多层差异网络深度入侵数据挖掘方法研究   总被引:2,自引:0,他引:2  
研究多层差异网络入侵的高效检测问题,保障工业网络控制系统的安全.由于在多层差异网络环境下,不同层次、不同深度的网络空间受到的入侵破坏程度和入侵特征完全不同.传统的入侵检测都是把这些差异化的入侵结果进行加权,计算一个融合后的阀值,衡量是否被入侵,但是这种方法没有对不同层次的入侵特征进行细分,误报率和漏报率较高,提出一种基于模糊C均值聚类算法的多层差异网络深度入侵检测的数据挖掘方法.采集相关数据进行样本特征的提取和分析,利用模糊C均值聚类方法对不同层的入侵数据进一步的分类计算,在分类后的结果中,获取异常数据的行为模式,根据不同模式的结果完成入侵检测.实验结果表明,利用改进算法进行多层差异网络深度入侵检测挖掘,能够提高检测准确率,降低误报率,提高检测效率.  相似文献   

8.
在网络入侵检测中,对入侵可能路径进行预估,都是以后发式入侵预防为主,无法形成先验预判,主要因为入侵特征存在较大伪装性,没有办法提取固定的入侵路径预判特征.传统的入侵检测方法都是基于固定入侵特征形成入侵判断的依据的,以后期发现为主,对网络的破坏已经形成,造成人侵检测缺陷较大.提出采用粒子群特征多层解析算法的入侵可能路径预先估算方法.根据主成分分析相关理论,获取对应的特征权重矩阵,得到入侵特征对角元素,完成入侵前期特征提取.根据粒子群特征多层次解析相关理论,获取初始粒子群,针对粒子群中不同层次的所有粒子进行交叉和变异运算,搜索入侵可能性最大的路径,实现入侵可能路径预先估算.实验结果表明,利用改进算法进行入侵可能路径预先估算,能够极大地提高估算的准确性和实时性,满足网络安全的实际需求.  相似文献   

9.
网络异常与普通的攻击特征不同,没有明显的行为特征.尤其是大差异样本数据集中,异常数据属性直接差异很大,很难形成统一的约束规范,传统的检测算法都是假设攻击行为特征提取的基础上,对上述异常行为很难进行判断,会出现判断多中心现象,造成误警率高,提出了一种大差异数据集的网络异常检测算法.针对大差异、高维度数据属性,运用主成分分析方法,对网络操作数据进行降维处理,引入一种差异行为判断的策略,对网络操作数据大差异特征进行分类处理,降低数据之间的差异性,从而保证差异行为能够被有效的分类约束描述.实验结果表明,利用改进算法能够有效提高网络中大差异异常数据检测的准确性.  相似文献   

10.
为了准确地评估网络安全风险,提高网络的整体安全性,提出了基于实时告警的层次化网络安全风险评估方法.提出了一种包含服务、主机和网络3级的网络分层风险评估模型.在此基础上以IDS (intrusion detection system)作为数据源,以威胁对象价值、脆弱性严重程度和威胁出现的频率作为核心变量,针对威胁攻击对象的不同进行分类计算,通过加权的方式计算网络各层的安全风险值.分别以实验室网络环境及校园网环境为实例,表明了该方法的准确性和有效性.  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
蒙古语言是中国蒙古族使用的通用语言,由于蒙古文区别于其他文字的书写方式和其自身变形机制等特点,在很多通用的文字处理引擎中都不被支持。在嵌入式产品开发与应用领域中Linux加QTE已经成为流行方式。该文给出了一种在QTE环境上实现基于标准Unicode的蒙古文点阵显示和变形算法, 并自定义了支持蒙古文的QTE组件,扩展了QTE功能,为在Linux加QTE方式的嵌入式体系结构中处理蒙古文提供了一种解决方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号