Welcome![Sign In][Sign Up]
Location:
Search - intrusion detection method

Search list

[Other resourceIDS_Testing

Description: 文章介绍了入侵检测系统测试的重要性和大概的测试标准,描述了入侵检测系统测试过程中的相关技术,如环境搭建、测试数据获取等。最后,文章介绍了入侵检测系统测试分析的方法,并对当今各种测试技术进行了简要的介绍。-article introduces the intrusion detection system testing and about the importance of the test, Description of Intrusion Detection System testing process related technologies, such as environmental structures, such as access to test data. Finally, the article describes the Intrusion Detection System test analysis method, and today's test techniques are briefly introduced.
Platform: | Size: 460159 | Author: 蔡青 | Hits:

[Other resourceUnix_detect

Description: 这本书讲解了unix系统的非法入侵检测方法-this book on the unix system of illegal intrusion detection method
Platform: | Size: 15204 | Author: 为刘 | Hits:

[Other resourceIDS_Testing

Description: 文章介绍了入侵检测系统测试的重要性和大概的测试标准,描述了入侵检测系统测试过程中的相关技术,如环境搭建、测试数据获取等。最后,文章介绍了入侵检测系统测试分析的方法,并对当今各种测试技术进行了简要的介绍。-article introduces the intrusion detection system testing and about the importance of the test, Description of Intrusion Detection System testing process related technologies, such as environmental structures, such as access to test data. Finally, the article describes the Intrusion Detection System test analysis method, and today's test techniques are briefly introduced.
Platform: | Size: 459776 | Author: 蔡青 | Hits:

[OtherUnix_detect

Description: 这本书讲解了unix系统的非法入侵检测方法-this book on the unix system of illegal intrusion detection method
Platform: | Size: 15360 | Author: 为刘 | Hits:

[AI-NN-PRBP_nids

Description: 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
Platform: | Size: 187392 | Author: jack | Hits:

[AI-NN-PRkmeanssource

Description: kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc.
Platform: | Size: 1024 | Author: bzhen | Hits:

[Othera_realtime_ids_system_based_on_one_class_svm

Description: 采用one-class svm进行入侵检测的文章,比较简洁,采用online训练的方法-Using one-class svm for intrusion detection articles, more concise, using online method of training
Platform: | Size: 99328 | Author: Yrf | Hits:

[AI-NN-PRResearch_on_Network_intrusion_detection_based_on_d

Description: 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的 审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人 的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实 验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system based on data mining is proposed, and its main idea is to apply data mining methods to learn rules that can capture normal and intrusion activities from pre- processed audit data that contain network connection information. Put forward a method to improve the Apriori algorithm, whose I/O is quite surprising when scanning the database. To improve the method is feasible the normal rules in the knowledge database in IDS are mined. And the experiment indicates that the model can produce new rules, which approve the validity and the feasibility of the IDS.
Platform: | Size: 207872 | Author: youby | Hits:

[DocumentsUnsupervisedAnomalyDetectionBasedOnPrincipalCompon

Description: 入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process requires a large logo of Jiandushuoju learning, negative effect on their application and promotion. In order to solve the problem, a principal component analysis based on unsupervised anomaly detection method, the principle of the minimum mean square error The main characteristics of the sample under study, after compression and the reciprocal reduction procedure to copy the sample information as possible to the mean square error of the difference according to detect anomalies. Construction of the simulation system has been proved, not based on principal component analysis anomaly detection methods to monitor without the participation of experts in early detection of invasive cases, experimental results show its effectiveness.
Platform: | Size: 450560 | Author: lwh | Hits:

[Software EngineeringProcess-tracking-method-based-Intrusion-Detection-

Description: 基于程序追踪方法的入侵检测系统的设计与研究-Process tracking method based Intrusion Detection System Design and Research
Platform: | Size: 250880 | Author: cclovevv | Hits:

[matlabadaptiveintuitionisticfuzzyreasoning

Description: 将直觉模糊集理论引入信息安全领域,自适应直觉模糊推理的入侵检测方法-The intuitionistic fuzzy set theory is introduced to the field of information security, intuitionistic fuzzy reasoning adaptive intrusion detection method
Platform: | Size: 405504 | Author: 冯晓芳 | Hits:

[OS programsnort-system

Description: 网上找到的几种在window用snort布置入侵检测系统的具体方法-Found on Internet window snort arrangement with several in the concrete method of intrusion detection system
Platform: | Size: 128000 | Author: 莫纯铎 | Hits:

[Otherintrusion

Description: 入侵检测的基本方法,课件,简单易学,包括神经网络,遗传算法-The basic method of intrusion detection, courseware, easy to learn
Platform: | Size: 18906112 | Author: 丁壳 | Hits:

[matlabIntrusion-Detection

Description: The problem of intrusion detection has been studied and received a lot of attention in machine learning and data mining in the literature survey. The existing techniques are not effective to improve the classification accuracy and to reduce high false alarm rate. Therefore, it is necessary to propose new technique for IDS. In this work, we propose a new K-means clustering method with a different Preprocessing and Genetic Algorithm for identifying intrusion and classification for both anomaly and misuse. The experiments of the proposed IDS are performed with KDD cup’99 data set. The experiments will clearly results the proposed method provides better classification accuracy over existing method.
Platform: | Size: 400384 | Author: Sumit | Hits:

[Windows Developlibsvm

Description: 随着计算机和网络技术应用的日益普及,网络安全问题 日显突出。来自计算机系统外部和内部的入侵者可能会对系 统进行破坏,或者试图窃取客户的个人信息。为了保证计算 机系统及信息的安全,网络入侵检测技术得到了发展和应用。-In order to optimize test efficiency of Intrusion Detection System(IDS) based on Support Vector Machine(SVM), a new intrusion detection method based on Graphics Processing Unit(GPU) and feature selection is proposed. During the process of intrusion detection, GPU-based parallel computing model is adopted and features of samples are reasonable selected. Experimental results demonstrate that the proposed method can reduce time consumption in the training procedure of IDS and the performance for intrusion detection is kept as usual.
Platform: | Size: 223232 | Author: 闫雪 | Hits:

[AI-NN-PRRelief_SBS

Description: 基于Relief_SBS特征选择算法的入侵检测方法研究_杨云峰-Relief_SBS feature selection algorithm based Intrusion Detection Method _ Yun-Feng Yang
Platform: | Size: 122880 | Author: 方贞 | Hits:

[Other3

Description: 本文围绕入侵检测系统进行了深入细致的研究,介绍了入侵检测的研究进展, 分析了入侵检测系统的特征、结构和分类,分析了入侵检测系统的发展方向以及 在入侵检测中常用的数据挖掘方法,深入研究了聚类技术在入侵检测系统中的应 用,并对系统性能做出评估-This paper focuses on the intrusion detection system has been studied intensively, research progress intrusion detection, Analysis of the characteristics, structure and classification of intrusion detection system, analyzes the development direction of intrusion detection systems and Commonly used in intrusion detection data mining method, in-depth study of clustering technology in Intrusion Detection System Use, and assess system performance
Platform: | Size: 993280 | Author: 路粮户 | Hits:

[Multimedia Developtrack

Description: 该程序是我多年的经验总结以及代码,实现了全景目标跟踪、火焰识别、烟雾识别、起立坐下行为判断、越界闯入、徘徊、违规停车等多种智能功能一体化,粒子滤波、贝叶斯分类器、随机森林等多种在线学习机制,还有传统的camshift、meanshift、光流法、卡尔曼滤波、struck、KCF、TLD、CT、区域匹配,相位相关、轮廓跟踪等多种算法-The program is my many years of experience and code, the realization of the panorama target tracking, flame detection, smoke detection, standing up sitting judge, cross-border intrusion, wandering, illegal parking and other various intelligent functions integration, particle filter, Bayesian classifier, random forest variety of online learning mechanism, and the traditional CAMSHIFT, meanshift, optical flow method, Kalman filter, the, KCF, regional matching, phase correlation, contour tracking and other several algorithms
Platform: | Size: 5217280 | Author: 王东 | Hits:

[Otherimproved-ACO-and-SVM

Description: 为了提高网络入侵检测的正确率,提出一种改进蚁群优化算法(ACO)和支持向量机(SVM)相融合的网络入侵检测方法(ACO-SVM)。-In order to improve network intrusion detection accuracy, this paper proposes a network detection method based on improved Ant Colony Optimization algorithm(ACO)and Support Vector Machine(ACO-SVM).
Platform: | Size: 533504 | Author: mafeng | Hits:

CodeBus www.codebus.net