Grey-theory based intrusion detection model

被引:2
作者
Qin Boping
机构
关键词
D O I
暂无
中图分类号
TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
To solve the problem that current intrusion detection model needs large-scale data in formulating the model in real-time use, an intrusion detection system model based on grey theory (GTIDS) is presented. Grey theory has merits of fewer requirements on original data scale, less limitation of the distribution pattern and simpler algorithm in modeling. With these merits GTIDS constructs model according to partial time sequence for rapid detect on intrusive act in secure system. In this detection model rate of false drop and false retrieval are effectively reduced through twice modeling and repeated detect on target data. Furthermore, GTIDS framework and specific process of modeling algorithm are presented. The affectivity of GTIDS is proved through emulated experiments comparing snort and next-generation intrusion detection expert system (NIDES) in SRI international.
引用
收藏
页码:230 / 235
页数:6
相关论文
共 10 条
[1]  
Jiang Jianchun,Ma Hengtai,Ren Dangen,et al.Asurvey of intrusion detection research on network security. Journal of Soft ware . 2000
[2]  
Chen Bo,Han Hong,Lun Xian-liang,et al.Asecurity defense systemframework. Mini Micro Systems . 2003
[3]  
Dennis J,Ingram H,Steven K.Distributed intrusion de-tection for computer system,using communicating agents. . 2000
[4]  
Steven A H.Ani mmunological model of distributed detec-tion andits applicationto computer security. . 1999
[5]  
Heady R,Luger G,Hof meyr A,et al.Computer i m-munology. Communications of the ACM . 1997
[6]  
Ludovic Me,Gassata.Agenetic algorithmas an alternative tool for security audit trails analysis. . 1996
[7]  
Deng Julong.Grey forecast and grey decision. . 2002
[8]  
Intrusion Detection Systems[C]. Liu Guiguo ITS Engineering&Technology Research Institute of Highway Ministry of Transport Beijing ,China.2011 3rd IEEE International Conference on Information Management and Engineering(ICIME 2011),1600
[9]  
Susan C L,David V H.Training a neural-network basedintrusion detector. IEEE Trans.System and Humans . 2001
[10]  
Roy A M,Ki mie M C,Tan Benchmarking.Anomaly-based detection systems. . 2000