The dynamic properties of the laser emission are very important in studying the characteristics of the laser and may reveal the underlying operating mechanism. Here we report a more precise measurement of the build-up...
详细信息
With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative...
详细信息
ISBN:
(纸本)7900719229
With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative works of the evaluation of intrusion detection systems was introduced. The primary aspects of intrusion detection systems in an evaluation were discussed. An evaluation system for intrusion detection systems was proposed. In the system, a supervisor module controls the whole system. The supervisor module schedules the traffic control module and the attack emulation module. The data in the evaluation environment are recorded and input to the evaluation module. The functions such as emulation of network traffic and host usage, emulation of attacks and evaluation report generation are implemented.
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specify...
详细信息
ISBN:
(纸本)7900719229
The paper proposes a new network intrusion detection system based on fuzzy neural network by redesigning the intrusion detection system's architecture and arithmetic. In order to overcome the difficulty of specifying the membership function of rules depending on experiences of experts in multi-dimension space.,neural network is introduced to distinguish non-linearly input/output characteristics of complex system and to generate rule sets and membership functions automatically. The new architecture adopts the network processor to collect and analyse the data in the low layer of network.,and to establish a prototype system. This system demonstrated in this experiment appears to be better intrusion detection ability, moreover, which is able to detect unknown attack and plays down false alarms.
暂无评论