Optimization of Dynamic Programming to the Multimedia Packets Processing Method for Network Intrusion Detection System

作者: Xu ZHAO , Jin Jiang , Max Stinnett

DOI: 10.14257/IJSIA.2015.9.11.04

关键词:

摘要:

参考文章(15)
Matthew V. Mahoney, Philip K. Chan, An analysis of the 1999 DARPA/lincoln Laboratory evaluation data for network anomaly detection recent advances in intrusion detection. pp. 220- 237 ,(2003) , 10.1007/978-3-540-45248-5_13
M. Arun, A. Krishnan, Functional verification of signature detection architectures for high speed network applications International Journal of Automation and Computing. ,vol. 9, pp. 395- 402 ,(2012) , 10.1007/S11633-012-0660-2
Hesham Altwaijry, Khalid Shahbar, (WHASG) Automatic SNORT Signatures Generation by using Honeypot Journal of Computers. ,vol. 8, pp. 3280- 3286 ,(2013) , 10.4304/JCP.8.12.3280-3286
Zhicai Shi, Yongxiang Xia, Fei Wu, Jian Dai, The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection Journal of Networks. ,vol. 9, pp. 1380- 1387 ,(2014) , 10.4304/JNW.9.6.1380-1387
Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu, Bing Jia, Intrusion Classifier based on Multiple Attribute Selection Algorithms Journal of Computers. ,vol. 8, pp. 2536- 2543 ,(2013) , 10.4304/JCP.8.10.2536-2543
Wen-Tie WU, Min LI, Bo LIU, Intrusion Detection Scheme based on IPSO-RBF Journal of Networks. ,vol. 8, pp. 2269- 2276 ,(2013) , 10.4304/JNW.8.10.2269-2276
Jiang She, An Improved Ant Colony Clustering Method for Intrusion Detection Computer Technology and Development. ,(2013)