首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 671 毫秒
1.
基于网络和主机相结合的入侵检测技术   总被引:5,自引:0,他引:5  
首先介绍了基于主机和基于网络的两种入侵检测系统的功能原理 ,在分析这两种系统功能原理的基础上 ,提出了基于网络和主机相结合入侵检测系统的工作流程和工作原理 ,进而阐明了当系统检测到有入侵情况下的应对措施 ,采用人工神经网络的入侵检测算法 ,提高了对入侵类型的判别能力 ,保证应对措施的正确 ,确保了系统的安全性。  相似文献   

2.
在分析目前入侵检测系统所面临问题的基础上,提出了一个基于移动agent的入侵检测系统模型.该系统具有安全性强、可移植性好、效率高等突出特点,代表了入侵检测技术发展的方向.  相似文献   

3.
分析了防火墙、入侵检测系统和蜜罐的性能;利用Honeyd虚拟了较大的网络,将被保护的网络隐藏其中;在对轻量级入侵检测系统Snort改进的基础上构建了联动控制中心CIC,对CIC各模块功能进行了描述,在CIC基础上建立了一种网络安全联动防御模型;并对模型实现中的关键技术和策略库中的联动规则进行了分析,通过实验证明该模型能...  相似文献   

4.
网络入侵检测的快速规则匹配算法   总被引:1,自引:0,他引:1  
在分析入侵检测系统的基础上,指出现有规则匹配算法的不足.提出一种新的规则匹配算法,该算法主要利用非精确匹配技术,缩小入侵分类的检测范围,达到快速匹配的目的.根据不同的安全性要求设置不同的门限值,该算法可用于预测适合不同门限值的可疑入侵行为.  相似文献   

5.
测试数据集的质量对入侵检测系统的性能起着至关重要的作用,在保证质量的前提下对入侵检测数据集优化降维,是提高入侵检测系统高效准确运转的重要措施.使用K近邻、决策树、随机森林和Softmax分类算法,对CSE-CIC-IDS2018入侵检测数据集进行特征维数探究,按照特征重要性评分对分类器进行特征递减式训练,分析机器学习分类器对该数据集的特征维数依赖关系.结果表明,数据集的特征数量由83个减少至最低7~9个时,分类器仍可以保持较高的分类性能,且检测时间显著减少,计算效率更高.  相似文献   

6.
采用行列双向压缩的数据处理策略,提出了一种基于主成分分析与模糊C-均值聚类算法的入侵检测样本数据压缩方法。该方法首先采用主成分分析法对数据冗余特征进行压缩,然后采用模糊C-均值聚类算法对冗余样本进行压缩,由此可挖掘入侵检测样本数据中的关键特征和关键样本。通过KDD CUP99数据集测试证明:数据双向压缩可减少入侵检测分类器的计算量,进而可提高其实时检测性能和检测推断的准确性。  相似文献   

7.
分析了异常入侵检测存在的问题,研究了基于模糊聚类的入侵检测算法。该算法采用C-均值算法,通过训练数据聚类、异常聚类划分和行为判定等3个步骤实现异常入侵检测。试验采用KDD99数据进行了测试,证明该算法是可行和有效的。  相似文献   

8.
分析了入侵检测中应用数据挖掘技术的基本思想,提出了一种基于数据挖掘的分布式入侵检测算法,并对该算法进行了仿真实验。结果证明,该算法能从大量网络流量连接记录中,挖掘出不同类型的关联入侵规则。  相似文献   

9.
为了提高系统的可靠性和可用性,提出一种基于静态随机存取存储器(Static Random-Access Memory,SRAM)型现场可编程门阵列(Field-Programmable Gate Array, FPGA)的SpaceWire路由器设计方法。路由器通过系统级三模冗余技术加固,采用基于位流重定位的动态部分刷新技术修复系统中发生的软故障,并提出一种基于工作输入和健康现态的实时状态同步方法,以确保故障模块修复后的状态与其他模块同步。因此,该系统能够进行错误掩蔽和自我修复。在Xilinx Virtex-5 FPGA开发板ML507上对所提出的路由器系统结构和设计方法进行实现和验证。实验结果表明,路由器的可靠性和可用性显著增加,且系统的实时性很好,能保证路由器在整个工作过程中提供正常服务而不会引起系统功能中断或延迟;位流重定位技术的采用将所需存储空间减少三分之二,同时也降低了原始位流本身故障的可能性。  相似文献   

10.
入侵检测系统是继防火墙之后的第二道网络安全防线。讨论了现有入侵检测技术 ,分析了该技术存在的问题 ,介绍了几种能较好解决这些问题的智能入侵检测新技术。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号