Depth study of the network environment based on software engineering theory and cutting-edge technology to improve the competitiveness of China's software industry breakthrough. Only by having a strong independent...
详细信息
This paper presents a personal identification system based on the learning of lifting dyadic wavelet filters. Our system consists of face learning, detection and identification processes. In the learning process, free...
详细信息
ISBN:
(纸本)0780382927
This paper presents a personal identification system based on the learning of lifting dyadic wavelet filters. Our system consists of face learning, detection and identification processes. In the learning process, free parameters in the lifting filters are determined so as to capture a facial part. Our face detection method is performed by applying the learned filters to each of video frames. A person whose face is detected in a maximum number of frames is identified as a target person. In simulation, it is shown that our personal identification algorithm is fast and accurate.
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security mo...
详细信息
With development and popularization of computer network, network security problems increasingly bring into prominence. Intrusion detection technique can effectively enlarge the scope of protection on network and syste...
详细信息
ISBN:
(纸本)9780769540207
With development and popularization of computer network, network security problems increasingly bring into prominence. Intrusion detection technique can effectively enlarge the scope of protection on network and system. An intrusion detection method based on support vector machine (SVM) is studied. Aiming at the shortcoming of SVM on detecting precision, an intrusion detection model based on improved SVM is put forward according to hypothesis test theory. To confirm the effectiveness of this approach, a simulation testing is done. The experiment results show that the improved SVM has stronger learning ability and higher accuracy and lower false positive rate.
The concepts of self, nonself, antibody, antigen and vaccine in in-Depth-Defense system for Network security was presented in this paper, the architecture of in-Depth Defense for network intrusion and detection based ...
详细信息
ISBN:
(纸本)9780769537474
The concepts of self, nonself, antibody, antigen and vaccine in in-Depth-Defense system for Network security was presented in this paper, the architecture of in-Depth Defense for network intrusion and detection based on immune principle is proposed. The intrusion information gotten from current monitored network is encapsulated and sent to the neighbor network as bacterin;therefore the neighbor network can make use of the bacterin and predict the danger of network. We can use communicate agent cooperated with response agent to achieve active defense formwork. The experimental results show that the new model not only actualizes an active prevention method but also improves the ability of intrusion detection and prevention than that of the traditional passive intrusion prevention systems
Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources, and it has become the mainstream of information assurance as the dramatic in...
详细信息
ISBN:
(纸本)9780769540207
Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources, and it has become the mainstream of information assurance as the dramatic increase in the number of attacks. Intrusion detection system (IDS) monitors and collects data from a target system that should be protected, processes and correlates the gathered information, and initiates responses when evidence of an intrusion is detected. In this paper, we designed and implemented a host-based intrusion detection system, which combines two detection technologies, one is log file analysis technology and the other is BP neural network technology. Log file analysis is an approach of misuse detection, and BP neural network is an approach of anomaly detection. By combination of these two kinds of detection technologies, the HIDS that we have implemented can effectively improve the efficiency and accuracy of intrusion detection.
Pattern matching is a basic operation in various kinds of string process system. Pattern matching algorithms play an important role in intrusion detection, information retrieval, feature matching of computer virus and...
详细信息
ISBN:
(纸本)9780769540207
Pattern matching is a basic operation in various kinds of string process system. Pattern matching algorithms play an important role in intrusion detection, information retrieval, feature matching of computer virus and so on. Base on analyzing BM algorithm and relative algorithms, a new improved pattern matching algorithm is presented. The improved algorithm makes use of singleness and combination of the Last Character and Next Character of string, to increase the probability of maximum displacement. Experiment results show that the improved algorithm can effectively improve the efficiency of the matching process.
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the ...
详细信息
The ROI regions in JPEG2000 coding system mostly are defined artificially but it will decrease working efficiency a lot. This paper proposed a new fast face detection method based on AdaBoost and skin color detection,...
详细信息
ISBN:
(纸本)9780769540207
The ROI regions in JPEG2000 coding system mostly are defined artificially but it will decrease working efficiency a lot. This paper proposed a new fast face detection method based on AdaBoost and skin color detection, and introduced it into the JPEG2000 coding system. The experiments show that the false alarm rate of the human face detection is obviously lower than AdaBoost.
With the growing number of botnet attacks, the botnet detection is becoming increasingly important for the network security. To enhance the existing botnet detection systems which are short of efficient information co...
详细信息
暂无评论