Research on Intrusion Detection Method Based on Neural Network

Abstract:

Article Preview

The research of this dissertation focuses on the quantitative methodologies of the network security assessment. So the dissertation gives the term “Model-based network security risk assessment” a more meaningful definition. The methodology called a model-based will use one network security analysis model to design the scenarios of threatens according to the Patterns behaviors of vulnerabilities and threatens in the network. And then the risk assessment will be done under those scenarios. Following this new definition. The dissertation Proposes a Component-centric Access Graph Based Network Security Risk Assessment Model (Oc-AGNSRAM).

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Edited by:

Li Yuan

Pages:

1483-1486

Citation:

C. Xu and W. F. Zhang, "Research on Intrusion Detection Method Based on Neural Network", Advanced Materials Research, Vols. 403-408, pp. 1483-1486, 2012

Online since:

November 2011

Export:

Price:

$41.00

[1] Li Dey, i Liu Changyu, Gan Wenyan. A New Cognitive Mode: l Cloud Model[ J]. International Journal of Intelligent Systems, 2009, 24(4): 357-375. JIANG Nan, GRUENWALD L, Research issues in data streams association rule mining[J]. ACM SIGKDD Record. 2006, 35(1): 14-19.

DOI: https://doi.org/10.1145/1121995.1121998

[2] Shi Zhicai. Research on methods of network risk evaluation [J]. ComputerApplications, 2008, 32(11): 211-214.

[3] WOOD AD, STANKOVIC JA. Denialofservice in sensornetworks[J]. Computer, 2002, 35(10): 54-62.

[4] KARLOF C, WAGNER D. Secure routing in wireless sensor networks: Attacks and countermeasures [J]. Elsevier s Ad Hoc Networks Journa, l Special Issue on Sensor Network Applications and Protocols, 2003, 1(2 /3): 293-315.

DOI: https://doi.org/10.1016/s1570-8705(03)00008-8

[5] PEFFIG A, CANETTIR, TYGAR JD, etal. TheTESLA broadcast authentication protocol[J]. RSA CryptoBytes, 2002, 5(2): 2-13.

[6] BROCH J, MALTZ D A, JOHNSON D B, et al. Jetcheva: A performance comparison ofmulti-hop wireless ad hoc network routing protocols[C]/Proceedings of theACM /IEEEMOBICOM 98. NewYork: ACM, 1998: 85-97.

DOI: https://doi.org/10.1145/288235.288256

[7] Fang Hong. Feng DengGuo. Information Security Risk Assessment Method and Application . [M]. Bengjing: Tsinghua university press. (2006).

[8] Hutt AE , Bosworth S. H, Douglas B. Com PuterS eeurity Handbook(Thirdedition)[M] NewYork: John Wiley& SonsInc. (1995).

[9] Zhang YongZhen, Fang BinXin. Used for assessment of network information system risk spreading model [J] Journal of software , 2007, 18(l): 137-145.

[10] Xiao XIAOchun. Research on Model-based Network Seeurity Risk Assessment[D]. Fudan university. (2008).