欢迎来到天天文库
浏览记录
ID:34470496
大小:40.42 KB
页数:4页
时间:2019-03-06
《intrusion detection in computer networks by multiple classifier systemsnew》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、IntrusionDetectioninComputerNetworksbyMultipleClassifierSystemsGiorgioGiacintoandFabioRoliDepartmentofElectricalandElectronicEngineering–UniversityofCagliari,ItalyPiazzaD’Armi–09123Cagliari,Italy{giacinto,roli}@diee.unica.itAbstractResearchersrecentlyproposedintrusiondetectio
2、nap-proachesbasedonpatternrecognitionalgorithmstrainedThesecurityofcomputernetworksplaysastrategiconmaliciousandnormaltrafficactivities[3-6].Thisfor-roleinmoderncomputersystems.Inordertoenforcehighmulationofintrusiondetectionproblemcombinestheprotectionlevelsagainstthreats,an
3、umberofsoftwareadvantagesofsignature-basedandanomaly-basedIDS.Ittoolsarecurrentlydeveloped.IntrusionDetectionSys-allowsdesigningdecision“boundaries”betweennormaltemsaimatdetectingintruderwhoeludedthe“firstline”andmaliciousnetworktraffic.Thankstothegeneralisa-protection.Inthis
4、paper,apatternrecognitionapproachtioncapabilityofpatternrecognitionalgorithms,itisalsotonetworkintrusiondetectionbasedonthemultipleclas-possibletodetectnewattacksthatexploitthesamevul-sifiersystemsparadigmisproposed.Thepotentialitiesofnerabilitiesofknownattacks.classifiercomb
5、inationfordatafusionandsomeopenInthispaper,anapproachtointrusiondetectioninissuesareoutlined.computernetworksbasedonmultipleclassifiersystemsisproposed.Thisapproachismotivatedbytheobservation1.Introductionthathumanexpertsusedifferentfeaturesetstodetectdifferentkindsofattacks.
6、Insection2,aformulationofNowadaysanincreasingnumberofcommercialandtheintrusiondetectionproblemasapatternrecognitionpublicservicesareofferedtroughInternet,sothatsecuritytaskisgiven.Thedatafusionapproachbasedonmultipleisbecomingoneofthekeyissues.Theso-called"attacks"classifiers
7、isillustratedinsection3,andresultsonapub-tointernetserviceprovidersarecarriedoutbyexploitinglicavailabledatasetarereportedinSection4,whereunknownweaknessesorbugsalwayscontainedinsystemconclusionsarealsodrawn.andapplicationsoftware[1-2].Computernetworksareusuallyprotectedagain
8、stattacksbyanumberofaccess2.ProblemFormulationrestrictionpoliciestha
此文档下载收益归作者所有