首页 | 本学科首页   官方微博 | 高级检索  
     

基于直觉模糊集理论的IDS方法研究
引用本文:邢瑞康,李成海.基于直觉模糊集理论的IDS方法研究[J].计算机科学,2018,45(Z11):344-348.
作者姓名:邢瑞康  李成海
作者单位:空军工程大学防空反导学院 西安710051,空军工程大学防空反导学院 西安710051
基金项目:本文受国家自然科学基金(61703426)资助
摘    要:入侵检测是网络系统安全维护过程中的有效方法之一,主要指通过对网络系统中的各种数据进行收集、分析,进而发现其中存在的可能对系统安全构成威胁的入侵攻击行为,并迅速作出响应的过程。但由于网络空间中的攻击形式多样,具有许多未知和不确定性,因此如何对其中的不确定性进行描述并采取相应的措施成为了构建入侵检测模型的重要一环。直觉模糊理论就是一种针对系统中存在的不确定性问题进行研究的理论。因此,通过对基于直觉模糊集理论的入侵检测方法进行深入研究发现,其 对于处理入侵检测系统中大量不确定性问题具有重要的作用和意义。文中对现有文献中3种典型的基于直觉模糊集理论的入侵检测方法进行了相对全面的分析介绍,并进行了适当的对比总结,指出了目前各种方法仍存在的不足 和未来的研究方向,这对其进一步的发展具有一定的参考价值。

关 键 词:入侵检测  直觉模糊  模糊推理  模糊聚类  综合评判

Research on Intrusion Detection System Method Based on Intuitionistic Fuzzy Sets
XING Rui-kang and LI Cheng-hai.Research on Intrusion Detection System Method Based on Intuitionistic Fuzzy Sets[J].Computer Science,2018,45(Z11):344-348.
Authors:XING Rui-kang and LI Cheng-hai
Abstract:Intrusion detection refers to the technology that collects and analyzes various kinds of data through several key points in a computer network or a computer system,so as to find and respond to possible intrusion attacks.However,due to the variety of attacks in cyberspace and many uncertainties,how to describe and deal with its objective existenceof uncertainty has become an important part of constructing an intrusion detection system model.Intuitionistic fuzzy set theory is a theory that studies the problem of uncertainty in the system.Therefore,studying intrusion detection methods based on intuitionistic fuzzy set theory plays an important role in dealing with a large number of uncertainties in intrusion detection systems.This paper summarized the typical intrusion detection methods based on intuitionistic fuzzy set theory in existing literatures and made a proper analysis and comparison,pointing out the shortcomings in the current related methods and the future development direction,which provide some reference value for further study.
Keywords:Intrusion detection  Intuitionistic fuzzy  Fuzzy reasoning  Fuzzy clustering  Comprehensive evaluation
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号