首页 | 本学科首页   官方微博 | 高级检索  
     

网络入侵检测系统的模糊规则学习模型
引用本文:许舟军,孙济洲,岳兵,于立.网络入侵检测系统的模糊规则学习模型[J].计算机工程,2005,31(9):21-22,154.
作者姓名:许舟军  孙济洲  岳兵  于立
作者单位:天津大学IBM中心,天津,300072;天津大学管理学院,天津,300072;天津住宅集团房地产销售有限公司,天津,300100
基金项目:国家“863”计划基金资助项目(2002AA142010)
摘    要:从如何完善和改进网络入侵检测系统的检测规则方面着眼,分析了入侵检测系统漏识和误识的原因,建立了一个网络入侵检测系统的模糊规则学习模型.文章首先证明了噪声环境下入侵行为的相似关系.并以入侵检测系统原有检测规则为基础,创建了基于权重的模糊检测规则.同时提出了一个反馈误差学习算法,用于对模糊检测规则进行改进以求达到识别的最优.模型可以方便地应用于各种基于规则的入侵检测系统.

关 键 词:入侵检测  模糊检测规则  反馈学习
文章编号:1000-3428(2005)09-0021-02

Fuzzy Rule Study Model of Network Intrusion Detection System
Xu Zhoujun,SUN Jizhou,Yue Bing,YU Li.Fuzzy Rule Study Model of Network Intrusion Detection System[J].Computer Engineering,2005,31(9):21-22,154.
Authors:Xu Zhoujun  SUN Jizhou  Yue Bing  YU Li
Affiliation:XU Zhoujun1,SUN Jizhou1,YUE Bing2,YU Li3
Abstract:This paper analyzes the cause of false-alarm and low detection rate of the intrusion detection systems. From the angle of mending the unprecision problem of detection rules, it creates a fuzzy rule study model for network intrusion detection system. First proveds the equivalence relation of the intrusion actions in the noise environment. From the origin rules of the existing intrusion detection system, creates weight-based fuzzy detection rules. And a feedback study algorithm is proposed, with which it modifies the fuzzy detection rules to get the optimal results of recognition. This model can be easily applied in all kinds of existing ruled-based intrusion detection systems.
Keywords:Intrusion detection  Fuzzy detection rule  Feedback study  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号