[1]王超,李永新.可重构网络中自适应入侵检测修复算法研究[J].计算机技术与发展,2014,24(03):130-133.
 WANG Chao[],LI Yong-xin[].Research of a Self-adaptive Intrusion Detection and Healing Algorithm in Reconfigurable Network[J].,2014,24(03):130-133.
点击复制

可重构网络中自适应入侵检测修复算法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年03期
页码:
130-133
栏目:
安全与防范
出版日期:
2014-03-31

文章信息/Info

Title:
Research of a Self-adaptive Intrusion Detection and Healing Algorithm in Reconfigurable Network
文章编号:
1673-629X(2014)03-0130-04
作者:
王超1李永新2
1.南阳理工学院 软件学院;2.南阳农业职业学院 计算机系
Author(s):
WANG Chao[1]LI Yong-xin[2]
关键词:
可重构入侵检测修复实时
Keywords:
reconfigurableintrusion detectionhealingreal-time
分类号:
TP393.01
文献标志码:
A
摘要:
随着越来越多实时应用程序的出现,计算机网络也面临着诸多挑战,如何有效防御入侵者的攻击已成为亟待解决的问题之一。为此,文中提出了一种在可重构网络环境下进行入侵检测和修复的算法。该算法既能够主动实时检测由入侵者删除节点所造成的网络中断,又能够在路径中断后及时采用基于度数的自适应修复算法来进行修复,以保持网络的连通性。实验表明该算法不仅检测延迟低,而且节点度数的增加和信令开销较小,能够较好地满足可重构网络的实时性需求。
Abstract:
As more and more real-time applications emerged,computer network faces many challenges,how to defend attack from intrud-ers efficiently is one of the problems need to be solved. Therefore,an intrusion detection and healing algorithm in reconfigurable networks is proposed. The algorithm can detect outage produced by deleting node actively and timely,and adopt a degree-based self-adaptive heal-ing algorithm to restore the network after path outage,in order to keep connectivity. The experiment shows that the detection delay of this algorithm is lower,and degree increase of the node as well as signaling overhead is smaller than other algorithms,it satisfies the real-time requirements of the reconfigurable networks well.

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(03):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(03):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(03):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(03):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(03):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(03):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(03):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(03):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(03):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(03):148.

更新日期/Last Update: 1900-01-01