Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Hebei University of Engineering(Natural Science Edition)》 2008-01
Add to Favorite Get Latest Update

An intrusion detection system based on memory principle

HUANG Guang-qiu,LI Xuan(Department of Management,Xi'an University of Architecture and Technology,Xi'an 710055,China)  
An analytical math model was established basing on three form and decline of biological memory and was used in intrusion detection system.The capacity limitation of short-term memory saved much storage space for the detection system;the long-term memory enabled the detection system to detect intrusion in a long time;the sense valve technology can regulate sensitiveness of system flexibly.IDS have advantages of the high accuracy of detection intrusion,an efficient decision-making process and low consumption of system resource.
【Fund】: 陕西省教育厅专项基金资助项目(06JK258);; 西安建筑科技大学基础研究基金项目(JC0616)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 PU Rong-fu(Network Centre of Mianyang Teachers College,Mianyang Sichuan 612000,China);Abnormal Intrusion Detection System Based on Normal Distribution[J];Journal of ABA Teachers College;2006-03
2 Yan Hui Cao Yuanda(Dept.of Computer Science and Engineering,Beijing Institute of Technology,Beijing100081);An Intrusion Statistic-based Anomaly Detection Method[J];Computer Engineering and Applications;2002-22
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 KONG Huijun(South China Teacher's University, Education and Science College Psychologist Department, Guangzhou 510631);Two Traditions in Memory Study[J];Journal of Anyang Teachers College;2003-03
2 ZHAO Jun_hui,XU Kun (College of Electronics and Information Engineering, Northern Jiaotong University, Beijing 100044,China);Design and Implement of Web Page Monitor and Restore System[J];Journal of Northern Jiaotong University;2002-01
3 CHEN Chuan,HE Yue,HE Chang-zheng(College of Commercial Management, SCU, Chengdu 610064, China);Economic pre-warning based on self-organization data mining[J];Journal of Chengdu University of Information Technology;2005-01
4 Hou Xiaomei Mao Zongyuan Institute of Electronic and Information,South China University of Technology,Guangzhou 510640 Zhang Bo Institute of Electronic Power,South China University of Technology,Guangzhou 510640;Internet Security Technology Based on P2DR Model[J];Computer Engineering and Applications;2000-12
5 Zhu Jianming Shi Tingjun Ma Jianfeng(School of Computer,Xidian University,Xi'an710071)(State Key Laboratory of Information Security,Chinese Academy of Sciences,Beijing100039);Multi-agents Based Intrusion-Tolerant Architecture[J];Computer Engineering and Applications;2003-11
6 ZHU Jie, HUANG Yanbo, WENG Yanbin (College of Information science and Engineering, Central South University,Changsha 410083);Faster Filter Algorithms in Intrusion Detection System[J];Computer Engineering;2003-16
7 JIN Guang1,ZHAO Yiming1,SHEN Minxin1,QIAN Jiaqi2 (1. Information College, Ningbo University, Ningbo 315211;2. Ningbo Public Security Bureau , Ningbo 315040);Diffusible Strategy Based on TCP Interception in Trusted-network[J];Computer Engineering;2004-01
8 GAO Yanling1, ZHANG Yuqing2, BAI Baoming1, WANG Xinmei1 (1.State Key Lab of Integrated Service Networks, Xidian University, Xi'an 710071; 2.National Computer Network Intrusion Protection Center, GSCAS, Beijing 100039);Survey of Webpage Protection System[J];Computer Engineering;2004-10
9 ZHANG Xian-feng,QIN Zhi-guang,LIU Jin-de (College of Computer Science and Engineering,UESTC of China,Chengdu Sichuan 610054,China);Research on the Network Security Architecture for Distributed Early Warning[J];Computer Applications;2004-05
10 LIU Jiao jiao,LI Jian hua (Dept.of Electronic Engineering,Shanghai Jiaotong University,Shanghai 200030,China);The Design and Realization of an Anti-tampering Web Page System[J];Application Research of Computers;2002-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved