Immune algorithms based on data processing in intrusion detection

被引:0
|
作者
Zhang, Yufang [1 ]
Xiong, Zhongyang [2 ]
Chen, Yan [3 ]
Li, Guangyong [1 ]
Geng, Xiaofei [1 ]
机构
[1] College of Computer Science, Chongqing University, Chongqing 400044, China
[2] Post-Doctorial Research Station of Electrical Engineering, Chongqing University, Chongqing 400044, China
[3] Chongqing College of Technology, Chongqing 400050, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
8
引用
收藏
页码:293 / 300
相关论文
共 50 条
  • [41] Network Packet Data Online Processing for Intrusion Detection System
    Jacobus, Agustinus
    Sinsuw, Alicia A. E.
    [J]. Proceeding of 2015 1st International Conference on Wireless and Telematics (ICWT), 2015,
  • [42] Network intrusion detection based on artificial immune clustering
    [J]. Zhong, J. (zhongjiang@cqu.edu.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [43] Research on the network intrusion detection based on the immune system
    Lin, Tao
    Sun, He-Xu
    Peng, Yu-Qing
    Lei, Zhao-Ming
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4479 - +
  • [44] A Network Intrusion Detection Model Based on Artificial Immune
    Xiao, Xin
    Zhang, Rui Rui
    [J]. NATURAL RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-3, 2012, 361-363 : 687 - 690
  • [45] An Immune Based Relational Database Intrusion Detection Algorithm
    Dong, Xiaomei
    Li, Xiaohua
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 295 - +
  • [46] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [47] Intrusion detection based on clustering a data stream
    Oh, SH
    Kang, JS
    Byun, YC
    Park, GL
    Byun, SY
    [J]. Third ACIS International Conference on Software Engineering Research, Managment and Applications, Proceedings, 2005, : 220 - 227
  • [48] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [49] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [50] Intrusion detection system based on data mining
    Zhan Jinhua
    [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405