Detecting and resolving conflict for network intrusion rule

被引:0
|
作者
Sun, Meifeng [1 ,2 ]
Gong, Jian [2 ]
机构
[1] School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
[2] College of Information Engineering, Yangzhou University, Yangzhou 225000, China
关键词
Computer networks;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:522 / 525
相关论文
共 50 条
  • [1] Rule Anomalies Detecting and Resolving for Software Defined Networks
    Wang, Pengzhan
    Huang, Liusheng
    Xu, Hongli
    Leng, Bing
    Guo, Hansong
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [2] Lightweight Detecting and Resolving Algorithm for Firewall Policy Conflict
    Xiao, Qi
    Qin, Yunchuan
    Xu, Cheng
    Li, Kenli
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 234 - 239
  • [3] Detecting Network Intrusion Using Probabilistic Neural Network
    Zhang, Ming
    Guo, Junpeng
    Xu, Boyi
    Gong, Jie
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2015, : 1151 - 1158
  • [4] A spatial model for detecting (and resolving) conflict caused by scale reduction
    Ware, JM
    Jones, CB
    [J]. ADVANCES IN GIS RESEARCH II, 1997, : 547 - 558
  • [5] Detecting intrusion with rule-based integration of multiple models
    Han, SJ
    Cho, SB
    [J]. COMPUTERS & SECURITY, 2003, 22 (07) : 613 - 623
  • [6] Predictive Rule Discovery for Network Intrusion Detection
    Patel, Kanubhai
    Buddhadev, Bharat
    [J]. INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 : 287 - 298
  • [7] A Bayesian network approach to detecting privacy intrusion
    An, Xiangdong
    Jutla, Dawn
    Cercone, Nick
    [J]. 2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS PROCEEDINGS, 2006, : 73 - +
  • [8] Detecting stepping-stone intrusion using association rule mining
    Hsiao, Han-Wei
    Sun, Huey-Min
    Fan, Wei-Cheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1225 - 1235
  • [9] A Statistical Rule Learning Approach to Network Intrusion Detection
    Rastegari, Samaneh
    Lam, Chiou-Peng
    Hingston, Philip
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [10] NADIR: An automated system for detecting network intrusion and misuse
    Hochberg, Judith
    Jackson, Kathleen
    Stallings, Cathy
    McClary, J.F.
    DuBois, David
    Ford, Josephine
    [J]. Computers and Security, 1993, 12 (03): : 235 - 248