Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of ABA Teachers College》 2006-03
Add to Favorite Get Latest Update

Abnormal Intrusion Detection System Based on Normal Distribution

PU Rong-fu(Network Centre of Mianyang Teachers College,Mianyang Sichuan 612000,China)  
This paper comes up with the basic theory and the formation of system for intrusion detection,analyses the intrusion detection technology and mainly focuses on the intrusion detection technology based on a statistic mode,on basis of which an algorithmic design is made.This algorithm with good applied cost is simple,feasible,and workable.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 HUANG Guang-qiu,LI Xuan(Department of Management,Xi'an University of Architecture and Technology,Xi'an 710055,China);An intrusion detection system based on memory principle[J];Journal of Hebei University of Engineering(Natural Science Edition);2008-01
【Citations】
Chinese Journal Full-text Database 2 Hits
1 Zhu Min Zhu Zhiping(Campus Network Center,Zhejiang University,Hangzhou 310027);NETWORK INTRUSION DETECTION TECHNIQUE[J];Computer Applications and Software;2004-06
2 QING Si-han, JIANG Jian-chun, MA Heng-tai, WEN Wei-ping, LIU Xue-fei (1. Institute of Software of Chinese Academy of Sciences, Beijing 100080, China; 2. Engineering Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing 100080, China; 3. Graduate School of Chinese Academy of Sciences, Beijing 100080, China);Research on intrusion detection techniques: a survey[J];Journal of China Institute of Communications;2004-07
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ;量子信息技术浅论[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 Luo Le-xia(Fujian Chuanzheng Communication College FujianFuzhou 350007);The Research on the Safety of Web-controlled[J];Information Security and Technology;2011-11
3 WU Jian-sheng,ZHAN Xue-gang(School of Computer Science and Engineering,Anshan University of Science and Technology,Anshan 114044,China);Research of intrusion detection system based-on state automaton about TCP protocol[J];Journal of Anshan University of Science and Technology;2005-05
4 GAO Chao,WANG Li-jun(School of Computer Science and Engineering,Anshan University of Science and Technology,Anshan 114044,China);Data mining technology's application on IDS based on system call[J];Journal of Anshan University of Science and Technology;2006-01
5 JIAO Ya-bing (Shan Dong Ying Cai Vocational Technology College,Linan 250104,China);Analysis and Study of Instruction Detection System in Network[J];Journal of Anyang Institute of Technology;2006-04
6 Yang Tianqi~1 Hou Jianmin~1 Shi Guohong~1 Hou Jiannan~2 (Hebei University of Engineering Handan 056038)~1 (Wuhan University of Technology Wuhan 460070)~2;Open the Routing Function of 3-layer Switch Ports[J];Office Informatization;2008-18
7 Li Shitong(Baoshan Teacher College,Baoshan,Yunnan 678000);Two Ways to Connect ADSL[J];Journal of Baoshan Teachers College;2006-05
8 CHU Long,CHEN Peng,FAN Jun-bo (School of Computer & Comm.Eng.,SWJTU,Chengdu 610031,China);Dynamic defense system of network security[J];Journal of Chengdu University of Information Technology;2004-03
9 LUO Ning~1,ZHU Ming-cheng~2,SHI Yan~1 (1.College of Computer & Communication Engineering,SWJTU,Chengdu 610031,China;2.EDA Center,Shenzhen University,Shenzhen 516080,China);Research of reconfigurable key encryption system[J];Journal of Chengdu University of Information Technology;2005-06
10 XIAO Li (Education Department, Ezhou University, Ezhou 436000,China);Realization of digital signatures using RSA cipher system[J];Journal of Changchun Institute of Technology;2002-04
China Proceedings of conference Full-text Database 6 Hits
1 Zhu Hongjie~(1,2) Li Daxing~1 1 Institute of Network Secutity,Shandong University 250100; 2 School of Computer Science and Technology,Shandong Institute of Light Industry 250353;Application of Digital Signature in E-commerce[A];[C];2008
2 Cui Nan Wang Xueming (Institute of Computer Science,Guizhou University,Guiyang Guizhou 550025);The Formal Analysis of Non-Repudiation of Ecommerce Protocol Based on SVO Logic[A];[C];2008
3 PENG Zhi-hao, LI Guan-yu (School of Computer science and Technology, Dalian Maritime University, DaLian 116026 China);A Survey on Distributed Intrusion Detection System[A];[C];2006
4 ZHAO Hui-ning (Institute of Missile, AFEU, Sanyuan 713800,China);The Improvement on Return Routability Mechanism Used in Mobile IPv6 Protocol[A];[C];2006
5 Wang Feng-Yu~(1,2) Yun Xiao-Chun~1 Cao Zhen-Zhong~3 (1.Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080)2.Graduate University of Chinese Academy of Science, Beijing 100039)(3.Computer Science College,Qufu Normal University,Qufu 273165);Detecting Network Anomaly on Multi-Time-Scale[A];[C];2007
6 Ma Heng-tail Liu Ke-longl Zhang Natal (“1.National Key Laboratory of Integrated Information System Technology,Institute of Software,Chinese Academy of Sciences”,Beijing,China 100080);Conspiring Concealment of Trojan Horses[A];[C];2007
【Co-references】
Chinese Journal Full-text Database 2 Hits
1 Yan Hui Cao Yuanda(Dept.of Computer Science and Engineering,Beijing Institute of Technology,Beijing100081);An Intrusion Statistic-based Anomaly Detection Method[J];Computer Engineering and Applications;2002-22
2 ;Style model of memory[J];China Scientific Journal of Hearing and Speich Rehabi;2004-05
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 JIN Minsuo,SUN Qiu,ZHU Dan(Information Network Center,Heilongjiang Institute of Science & Technology,Harbin 150027,China);Application of boundary detection algorithm in invasion pattern classification and feature extraction[J];Journal of Heilongjiang Institute of Science and Technology;2011-02
【Secondary Citations】
Chinese Journal Full-text Database 4 Hits
1 Xue Yinghua LüShuwang Su Guiping Yang Zhu(State Key Laboratory of Information Security,Graduate School of the Chinese Academy of Sciences,Beijing100039);Analysis and Investigation of Intrusion Detection System[J];Computer Engineering and Applications;2003-01
2 Ruan Yaoping; Yi Jiangbo; Zhao Zhangsheng(State Key Lab of Information Security, Graduate School of USTC, Beijing 100039);The Model and Methodology of Intrusion Detection in Computer System[J];COMPUTER ENGINEERING;1999-09
3 SHENG Siyuan, ZHAN Shouyi, SHI Yaobin (Dept. of Computer Science and Engineering, Beijing Institute of Technology, Beijing 100081);Intrusion Detection System Based on Data Mining[J];Computer Engineering;2003-01
4 HU Kan\ XIA Shao wei(Department of Automation\ Tsinghua University\ Beijing\ 100084);Large Data Warehouse based Data Mining: a Survey[J];JOURNAL OF SOFTWARE;1998-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved