网络安全中混合型入侵检测系统设计

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

网络安全中混合型入侵检测系统设计作者:胡佳明学位授予单位:浙江大学参考文献(49条)1.中国互联网络信息中心(CNNIC)第12期《全球互联网统计信息跟踪报告》20052.中国互联网络信息中心(CNNIC)第十六次《中国互联网络发展状况统计报告》20053.胡道元.闵京华网络安全20044.国家计算机网络应急技术处理协调中心CNCERT/CC2005年上半年网络安全工作报告20055.梁亚声.汪永益.刘京菊计算机网络安全技术教程20046.SKent.RAtkinsonIPAuthenticationHeader19987.SKent.RAtkinsonIPEncapsulatingSecurityPayload(ESP)19988.张千里.陈光英网络安全新技术20039.RHeady.GLuger.AMaccabe.MServillaTheArchitectureofaNetworkLevelIntrusionDetectionSystem,TechnicalReportCS90-20199010.JamesPAndersonComputerSecurityThreatMonitoringandSurveillance,Technicalreport198011.SESmahaHaystack:AnIntrusionDetectionSystem198812.查看详情13.IDSCAnIntroductiontoIntrusionDetectionAssessment199914.DorothyEDenningAnIntrusionDetectionModel198715.蒋建春.冯登国网络入侵检测原理与技术200116.唐正军.李建华入侵检测技术200417.PaulEProctor.邓琦皓.许鸿飞.张斌ThePracticalIntrusionDetectionHandbook200218.罗守山入侵检测200419.WLee.SJStolfoDataMiningApproachesforIntrusionDetection199820.WLee.SJStolfo.KWMokMiningAuditDatatoBuildIntrusionDetectionModels199821.WLee.SJStolfo.KWMokADataMiningFrameworkforBuildingIntrusionDetectionModels199922.UFayyad.GPiatetskyshapiro.PSmythTheKDDProcessofExtractingUsefulKnowledgefromVolumesofData1996(11)23.RAgrawal.RSrikantFastAlgorithmsforMiningAssociationRules199424.RSrikant.QVu.RAgrawalMiningAssociationRuleswithItemConstraints199725.ZHuangClusteringLargeDataSetswithMixedNumericandCategoricalValues199726.KFox.RHenning.JReedANeuralNetworkApproachtowardIntrusionDetection199027.JCannadyArtificialNeuralNetworkforMisuseDetection199828.TLane.CEBrodlayTemporalSequenceLearningandDataReductionforAnomalyDetection199929.TLunt.ATamaru.FGilham.RJagannathanCJalaliHSJavitzAValdesPGNeumannTDGarveyARealtimeIntrusionDetectionExpertSystem(IDES)199230.PAPorras.RAKemmererPenetrationStateTransitionAnalysis:ARule-basedIntrusionDetectionApproach199231.查看详情32.查看详情33.HongyuYang.LixiaXie.JizhouSunAnApplicationofDecisionSupporttoNetworkIntrusionDetection200434.AkiraKanaoka.EijiOkamotoMultivariateStatisticalAnalysisofNetworkTrafficforIntrusionDetection35.HTeng.KChen.SLuAdaptiveReal-timeAnomalyDetectionUsingInductivelyGenerationSequentialPatterns199036.查看详情37.查看详情38.查看详情39.查看详情40.HAkaikeANewLookatStatisticalModelIdentification1974(06)41.MThrottan.CJiAdaptiveThresholdingforProactiveNetworkProblemDetection199842.查看详情43.RSBoyer.JSMooreAFastStringSearchAlgorithm1977(10)44.FWhiteAModelforDataFusion198845.DHall.JLlinasAnIntroductiontoMultisensorDataFusion[外文期刊]1997(01)46.DavidLHall.JamesLlniasHandbookofMutisensorDataFusion200147.LawrenceAKlein.戴亚平多传感器数据融合理论及应用200448.徐慧.刘凤玉多特征融合的入侵检测[期刊论文]-计算机工程2004(15)49.查看详情本文链接:

1 / 87
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功