JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

Volume 32 Issue 3
May 2017
Article Contents
JIANG Ya-ping, CAO Cong-cong and MEI Xiao. Research progress and prospect of network intrusion detection technology[J]. Journal of Light Industry, 2017, 32(3): 63-72. doi: 10.3969/j.issn.2096-1553.2017.3.011
Citation: JIANG Ya-ping, CAO Cong-cong and MEI Xiao. Research progress and prospect of network intrusion detection technology[J]. Journal of Light Industry, 2017, 32(3): 63-72. doi: 10.3969/j.issn.2096-1553.2017.3.011 shu

Research progress and prospect of network intrusion detection technology

  • Received Date: 2015-12-03
    Accepted Date: 2016-10-25
    Available Online: 2017-05-15
  • Networks are facing more and more virus, vulnerability and hacker attacks at present. As one of the core of the network security defense technology, intrusion detection technology can effectively detect attacks. The related research and technology of network intrusion detection technology at different stages of development, and the new technology and its products based on neural network, data fusion and computer immunology were summarized. Based on the performance evaluation index of intrusion detection products, it was pointed out that the discipline integration, efficient intelligent intrusion detection, intrusion detection immune prevention, wireless network intrusion detection, advanced defense technology defense were the development trend and the research direction of network intrusion detection in the future.
  • 加载中
    1. [1]

      杨烨,李唐宁.信息安全"黑洞门"触目惊心[N].经济参考报,2015-03-04(001).

    2. [2]

      赵泽茂,吕秋云,朱芳.信息安全技术[M].西安:西安电子科技大学出版社,2009.

    3. [3]

      ANDERSON J P.Computer security threat monitoring and surveillance[R].[S.l.:s.n.],1980.

    4. [4]

      DENNING D E.An intrusion detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222.

    5. [5]

      SMAHA S E.Haystack:an intrusion detection system [C]//Aerospace Computer Security Applications Conference.Piscataway:IEEE Conference Publications,1988:37.

    6. [6]

      LUNT T F,JAGANNATHAN R,LEE R,et al.Knowledge-based intrusion detection[C]//AI Systems in Government Conference.Piscataway:IEEE Conference Publications,1989:102.

    7. [7]

      HEBERLEIN L T,DIAS G V,LEVITT K N,et al.A network security monitor[J].IEEE Computer Society Symposium on Research in Security and Privacy,1990:296.

    8. [8]

      CHEN S S,CHEUNG S, CRAWFORD R H, et al. GrIDS-A Graph Based Intrusion Detection System for Large Networks[C]//Proceedings of the 19th National Information System Security Conference,[S.l.:s.n.],1996: 56.

    9. [9]

      SINCLAIR C,PIERCE L,MATZNER S.An application of machine learning to network intrusion detection[C]//Computer Security Applications Conference.Piscataway:IEEE Conference Publications,1999:371.

    10. [10]

      凌军,曹阳,尹建华,等.基于时态知识模型的网络入侵检测方法研究[J].计算机学报,2003,26(11):1591.

    11. [11]

      YU Z W,TSAI J J P,WEIGERT T.An automatically tuning intrusion detection system[J].IEEE Transactions on Systems,Man,and Cybernetics,Part B(Cybernetics),2007,37(2):373.

    12. [12]

      GHOSH A K,SCHWARTZBARD A,SCHATZ M.Learning program behaviour profiles for intrusion detection[C]// Conference on Workshop on Intrusion Detection and Network Monitoring[S.l.:s.n.],1999:51.

    13. [13]

      蒋亚平,赵军伟,冯柳,等.基于疫苗算子的入侵检测模型[J].计算机工程与设计,2014,35(7):2335.

    14. [14]

      ZHAO X F,JIANG H,JIAO L Y.A data fusion based intrusion detection model[C]//2009 First International Workshop on Education Technology and Computer Science.Piscataway:IEEE Conference Publications,2009:1017.

    15. [15]

      DESALE K S,KUMATHEKAR C N,CHAVAN A P.Efficient intrusion detection system using stream data mining classification technique[C]//International Conference on Computing Communication Control and Automation(ICCUBEA).Piscataway:IEEE Conference Publications,2015:469.

    16. [16]

      CHEN Y.Intelligent intrusion detection based on soft computing[C]//The 7th International Conference on Measuring Technology and Mechatronics Automation (ICM TMA).Piscataway:IEEE Conference Publications,2015:577.

    17. [17]

      HEDAR A R,OMER M A,Al-Sadek A F,et al.Hybrid evolutionary algorithms for data classification in intrusion detection systems[C]// ACIS 16th International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).Piscataway:IEEE Conference Publications,2015:1.

    18. [18]

      GONG W,FU W L,CAI L.A neural network based intrusion detection data fusion model[C]//Third International Joint Conference on Computational Science and Optimization (CSO).Piscataway:IEEE Conference Publications,2010:410.

    19. [19]

      CHEN M J,CHIEN K P,HUANG C Y,et al.An ASIC for SMTP intrusion prevention system[C]//IEEE International Symposium on Circuits and Systems.Piscataway:IEEE Conference Publications,2009:1847.

    20. [20]

      AL-HAMAMI A H,AL-SAADOON G M W.Development of a network-based:intrusion prevention system using a data mining approach[C]//Science and Information conference (SAI).Piscataway:IEEE Conference Publications,2013:641.

    21. [21]

      JIANG Y P,CHANG J L.Intrusion prevention system base on immune vaccination[C]//Second International Conference on Intelligent Computation Technology and Automation.Piscataway:IEEE Conference Publications,2009:350.

    22. [22]

      CHEN G L,YAO H,WANG Z B.An intelligent WLAN intrusion prevention system based on signature detection and plan recognition[C]//Second International Conference on Future Networks.Piscataway:IEEE Conference Publications,2010:168.

    23. [23]

      ALQAHTANI S M,BALUSHI M A,JOHN R.An intelligent intrusion prevention system for cloud computing (SIPSCC)[C]//2014 International Conference on Computational Science and Computational Intelligence (CSCI).Piscataway:IEEE Conference Publications,2014:152.

    24. [24]

      LI Song,ZOU Q,HUANG W.A new type of intrusion prevention system[C]//2014 International Conference on Information Science,Electronics and Electrical Engineering (ISEEE).Piscataway:IEEE Conference Publications,2014:361.

    25. [25]

      LI H,LIU D H.Research on intelligent intrusion prevention system based on snort[C]//International Conference on Computer,Mechatronics,Control and Electronic Engineering (CMCE).Piscataway:IEEE Conference Publications,2010:251.

    26. [26]

      唐正军,李建华.入侵检测技术[M].北京:清华大学出版社,2004.

    27. [27]

      靳蕃.神经计算智能基础[M].成都:西南交通大学出版社,2000.

    28. [28]

      吴峻,李洋.基于BP 神经网络和特征选择的入侵检测模型[J].计算机工程与应用,2008,44(30):114.

    29. [29]

      YANG Z M,WEI X M,BI L Y,et al.An intrusion detection system based on RBF neural network[C]//Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design.Piscataway:IEEE Conference Publications,2005:873.

    30. [30]

      时小虎,梁艳春,徐旭.改进的 Elman 模型与递归反传控制神经网络[J].软件学报,2003,14(6):1110.

    31. [31]

      杨宏宇,赵明瑞,谢丽霞.基于自适应进化神经网络算法的入侵检测[J].计算机工程与科学,2014,36(8):1469.

    32. [32]

      杨雅辉,黄海珍,沈晴霓,等.基于增量式GHSOM神经网络模型的入侵检测研究[J].计算机学报,2014,37(5):1216.

    33. [33]

      田俊峰,赵卫东,杜瑞忠,等.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115.

    34. [34]

      FESSI B A,ABDALLAH S B,DJEMAIEL Y,et al.A clustering data fusion method for intrusion detection system[C]//IEEE 11th International Conference on Computer and Information Technology (CIT).Piscataway:IEEE Conference Publications,2011:539.

    35. [35]

      PUGH M.A minimax approach to sensor fusion for intrusion detection[C]//IEEE on Sensors Applications Symposium (SAS).Piscataway:IEEE Conference Publications,2015:1.

    36. [36]

      梁可心,李涛,刘勇,等.一种基于人工免疫理论的新型入侵检测模型[J].计算机工程与应用,2005(2):129.

    37. [37]

      ZHAO J H,LIU N.A dynamic intrusion detection model based on immunity for wireless sensor network[C]//The Third International Workshop on Intelligent Systems and Applications (ISA).Piscataway:IEEE Conference Publications,2011:1.

    38. [38]

      张玲,白中英,谢康.动态疫苗接种的入侵检测侧方法[J].北京邮电大学学报,2014,37(Z):77.

    39. [39]

      刘海龙,张凤斌,席亮.基于协同进化的免疫检测器分布优化算法[J].计算机工程,2013,39(11):154.

    40. [40]

      冯翔,马美怡,赵天玲,等.基于复合免疫算法的入侵检测系统[J].计算机科学,2014,41(12):43.

    41. [41]

      丁菊玲,刘晓洁,李涛,等.基于人工免疫的网络入侵动态取证[J].四川大学学报(工程科学版),2004,36(5):108.

    42. [42]

      WANG H R,WANG H.Research and design of multi-agent based intrusion detection system on wireless network[C]//International Symposium on Computational Intelligence and Design.Piscataway:IEEE Conference Publications,2008:444.

    43. [43]

      KUMAR G V P,REDDY D K.An agent based intrusion detection system for wireless network with artificial immune system (AIS) and negative clone selection [C]//International Conference on Electronic Systems,Signal Processing and Computing Technologies (ICESC).Piscataway:IEEE Conference Publications,2014:429.

Article Metrics

Article views(5167) PDF downloads(118) Cited by()

Ralated
    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return