Description: 文章介绍了入侵检测系统测试的重要性和大概的测试标准,描述了入侵检测系统测试过程中的相关技术,如环境搭建、测试数据获取等。最后,文章介绍了入侵检测系统测试分析的方法,并对当今各种测试技术进行了简要的介绍。-article introduces the intrusion detection system testing and about the importance of the test, Description of Intrusion Detection System testing process related technologies, such as environmental structures, such as access to test data. Finally, the article describes the Intrusion Detection System test analysis method, and today's test techniques are briefly introduced. Platform: |
Size: 460159 |
Author:蔡青 |
Hits:
Description: 文章介绍了入侵检测系统测试的重要性和大概的测试标准,描述了入侵检测系统测试过程中的相关技术,如环境搭建、测试数据获取等。最后,文章介绍了入侵检测系统测试分析的方法,并对当今各种测试技术进行了简要的介绍。-article introduces the intrusion detection system testing and about the importance of the test, Description of Intrusion Detection System testing process related technologies, such as environmental structures, such as access to test data. Finally, the article describes the Intrusion Detection System test analysis method, and today's test techniques are briefly introduced. Platform: |
Size: 459776 |
Author:蔡青 |
Hits:
Description: 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model Platform: |
Size: 187392 |
Author:jack |
Hits:
Description: kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc. Platform: |
Size: 1024 |
Author:bzhen |
Hits:
Description: 采用one-class svm进行入侵检测的文章,比较简洁,采用online训练的方法-Using one-class svm for intrusion detection articles, more concise, using online method of training Platform: |
Size: 99328 |
Author:Yrf |
Hits:
Description: 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的
审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人
的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实
验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system based on data mining is proposed, and its main idea is to apply data mining
methods to learn rules that can capture normal and intrusion activities from pre- processed audit data that contain network connection
information. Put forward a method to improve the Apriori algorithm, whose I/O is quite surprising when scanning the database.
To improve the method is feasible the normal rules in the knowledge database in IDS are mined. And the experiment indicates that
the model can produce new rules, which approve the validity and the feasibility of the IDS. Platform: |
Size: 207872 |
Author:youby |
Hits:
Description: 入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process requires a large logo of Jiandushuoju learning, negative effect on their application and promotion. In order to solve the problem, a principal component analysis based on unsupervised anomaly detection method, the principle of the minimum mean square error The main characteristics of the sample under study, after compression and the reciprocal reduction procedure to copy the sample information as possible to the mean square error of the difference according to detect anomalies. Construction of the simulation system has been proved, not based on principal component analysis anomaly detection methods to monitor without the participation of experts in early detection of invasive cases, experimental results show its effectiveness. Platform: |
Size: 450560 |
Author:lwh |
Hits:
Description: 基于程序追踪方法的入侵检测系统的设计与研究-Process tracking method based Intrusion Detection System Design and Research Platform: |
Size: 250880 |
Author:cclovevv |
Hits:
Description: 将直觉模糊集理论引入信息安全领域,自适应直觉模糊推理的入侵检测方法-The intuitionistic fuzzy set theory is introduced to the field of information security, intuitionistic fuzzy reasoning adaptive intrusion detection method Platform: |
Size: 405504 |
Author:冯晓芳 |
Hits:
Description: 网上找到的几种在window用snort布置入侵检测系统的具体方法-Found on Internet window snort arrangement with several in the concrete method of intrusion detection system
Platform: |
Size: 128000 |
Author:莫纯铎 |
Hits:
Description: The problem of intrusion detection has been studied and received a lot of attention in
machine learning and data mining in the literature survey. The existing techniques are not
effective to improve the classification accuracy and to reduce high false alarm rate.
Therefore, it is necessary to propose new technique for IDS. In this work, we propose a
new K-means clustering method with a different Preprocessing and Genetic Algorithm
for identifying intrusion and classification for both anomaly and misuse.
The experiments of the proposed IDS are performed with KDD cup’99 data set. The
experiments will clearly results the proposed method provides better classification
accuracy over existing method. Platform: |
Size: 400384 |
Author:Sumit |
Hits:
Description: 随着计算机和网络技术应用的日益普及,网络安全问题
日显突出。来自计算机系统外部和内部的入侵者可能会对系
统进行破坏,或者试图窃取客户的个人信息。为了保证计算
机系统及信息的安全,网络入侵检测技术得到了发展和应用。-In order to optimize test efficiency of Intrusion Detection System(IDS) based on Support Vector Machine(SVM), a new intrusion
detection method based on Graphics Processing Unit(GPU) and feature selection is proposed. During the process of intrusion detection, GPU-based
parallel computing model is adopted and features of samples are reasonable selected. Experimental results demonstrate that the proposed method can
reduce time consumption in the training procedure of IDS and the performance for intrusion detection is kept as usual. Platform: |
Size: 223232 |
Author:闫雪 |
Hits:
Description: 本文围绕入侵检测系统进行了深入细致的研究,介绍了入侵检测的研究进展,
分析了入侵检测系统的特征、结构和分类,分析了入侵检测系统的发展方向以及
在入侵检测中常用的数据挖掘方法,深入研究了聚类技术在入侵检测系统中的应
用,并对系统性能做出评估-This paper focuses on the intrusion detection system has been studied intensively, research progress intrusion detection,
Analysis of the characteristics, structure and classification of intrusion detection system, analyzes the development direction of intrusion detection systems and
Commonly used in intrusion detection data mining method, in-depth study of clustering technology in Intrusion Detection System
Use, and assess system performance Platform: |
Size: 993280 |
Author:路粮户 |
Hits:
Description: 该程序是我多年的经验总结以及代码,实现了全景目标跟踪、火焰识别、烟雾识别、起立坐下行为判断、越界闯入、徘徊、违规停车等多种智能功能一体化,粒子滤波、贝叶斯分类器、随机森林等多种在线学习机制,还有传统的camshift、meanshift、光流法、卡尔曼滤波、struck、KCF、TLD、CT、区域匹配,相位相关、轮廓跟踪等多种算法-The program is my many years of experience and code, the realization of the panorama target tracking, flame detection, smoke detection, standing up sitting judge, cross-border intrusion, wandering, illegal parking and other various intelligent functions integration, particle filter, Bayesian classifier, random forest variety of online learning mechanism, and the traditional CAMSHIFT, meanshift, optical flow method, Kalman filter, the, KCF, regional matching, phase correlation, contour tracking and other several algorithms Platform: |
Size: 5217280 |
Author:王东 |
Hits:
Description: 为了提高网络入侵检测的正确率,提出一种改进蚁群优化算法(ACO)和支持向量机(SVM)相融合的网络入侵检测方法(ACO-SVM)。-In order to improve network intrusion detection accuracy, this paper proposes a network detection method based
on improved Ant Colony Optimization algorithm(ACO)and Support Vector Machine(ACO-SVM). Platform: |
Size: 533504 |
Author:mafeng |
Hits: