Journal on Communications ›› 2020, Vol. 41 ›› Issue (7): 121-130.doi: 10.11959/j.issn.1000-436x.2020111
• Papers • Previous Articles Next Articles
Youliang TIAN1,2,3,Yulong WU1,2,Qiuxian LI1,2
Revised:
2020-04-14
Online:
2020-07-25
Published:
2020-08-01
Supported by:
CLC Number:
Youliang TIAN,Yulong WU,Qiuxian LI. Optimum response scheme of intrusion detection based on information theory[J]. Journal on Communications, 2020, 41(7): 121-130.
[1] | WU S X , BANZHAF W W . The use of computational intelligence in intrusion detection systems:a review[J]. Applied Soft Computing, 2010,10(1): 1-35. |
[2] | ZHU J M , RAGHUNATHAN S . Evaluation model of information security technologies based on game theoretic[J]. Chinese Journal of Computers, 2009,32(4): 828-834. |
[3] | RHEE H , RYU Y . Evaluation of intrusion detection systems under a resource constraint[J]. ACM Transaction on Information and System Security, 2008,11(4): 95-118. |
[4] | CAVUSOGLU H , RAGHUNATHAN M S . The value of intrusion detection systems in information technology security architecture[J]. Information Systems Research, 2005,16(1): 28-46. |
[5] | TIAN Y L , LI Q X , HU J ,et al. Secure limitation analysis of public-key cryptography for smart card settings[J]. World Wide Web, 2020(23): 1423-1440. |
[6] | SUBBA B , BISWAS S , KARMAKAR S . False alarm reduction in signature-based IDS:game theory approach[J]. Security and Communication Networks, 2016,9(18): 4865-4881. |
[7] | ANDERSON J P . Computer security threat monitoring and surveillance[Z].[S.n.:s.l.],(1980-04-15)[2020-03-24]. [S.n.:s.l.], |
[8] | DENNING D E . An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987,13(2): 222-232. |
[9] | ATHANASIADES N , ABLER R , LEVINE J ,et al. Intrusion detection testing and benchmarking methodologies[J]. IEEE Proceedings First IEEE International Workshop on Information Assurance, 2003: 63-72. |
[10] | JIANG J C , MA H T , REN D E ,et al. A survey of intrusion detection research on network security[J]. Journal of Software, 2000,11(11): 1460-1466. |
[11] | PAXSON V . Bro:a system for detecting network intruders in realtime[J]. Computer Networks, 1999,31(23-24): 2435-2463. |
[12] | GARCíA-TEODORO P , DíAZ-VERDEJO P , MACIá-FERNáNDEZ G .et al. Anomaly-based network intrusion detection:techniques,systems and challenges[J]. Computers & Security, 2009,28(1-2): 18-28. |
[13] | LIN W C , KE S W , TSAI C F . CANN:an intrusion detection system based on combining cluster centers and nearest neighbors[J]. Knowledge-Based Systems, 2015,78: 13-21. |
[14] | CHEN P , DESMET L , HUYGENS C . A study on advanced persistent threats[C]// 15th International Conference on Communications and Multimedia Security. New York:ACM Press, 2014: 63-72. |
[15] | FRIEDBERG I , SKOPIK F , SETTANNI G ,et al. Combating advanced persistent threats[J]. Computers & Security, 2015,48(C): 35-57. |
[16] | ZHANG Y , PAN X M , QING Z L ,et al. APT attacks and defenses[J]. Journal of Tsinghua University (Science and Technology), 2017(11): 10-16. |
[17] | RUBIO J E , ALCARAZ C , ROMAN R ,et al. Current cyber-defense trends in industrial control systems[J]. Computers & Security, 2019:87. |
[18] | LUH R , JANICKE H , SCHRITTWIESER S . AIDIS:detecting and classifying anomalous behavior in ubiquitous kernel processes[J]. Computers & Security, 2019(84): 120-147. |
[19] | MOON D , IM H , KIM I ,et al. DTB-IDS:an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks[J]. The Journal of Supercomputing, 2015(73): 1-15. |
[20] | VRIES J D , HOOGSTRAATEN H , BERG J V D ,et al. Systems for detecting advanced persistent threats:a development roadmap using intelligent data analysis[C]// International Conference on Cyber Security. Piscataway:IEEE Press, 2013. |
[21] | PIETRASZEK T , . Using adaptive alert classification to reduce false positives in intrusion detection[C]// International Workshop on Recent Advances in Intrusion Detection—RAID 2004. Berlin:Springer, 2004: 102-124. |
[22] | HACHMI F , BOUJENFA K , LIMAM M . Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization[J]. Journal of Network & Systems Management, 2019,27(1): 93-120. |
[23] | ZONOUZ S A , KHURANA H , SANDERS W H ,et al. RRE:a game-theoretic intrusion Response and Recovery Engine[J]. IEEE Transactions on Parallel and Distributed systems, 2013,25(2): 395-406. |
[24] | CUPPENS N , CUPPENS F , VERAGRA J ,et al. An ontology-based approach to react to network attacks[J]. International Journal of Information & Computer Security, 2008,3(3/4): 280-305. |
[25] | 吴姚睿, 刘淑芬 . 基于攻击群模型的协同入侵的响应方法[J]. 电子学报, 2009,37(11): 2416-2419. |
WU Y R , LIU S F . A response method for cooperative intrusions based on the attack group model[J]. Acta Electronica Sinica, 2009,37(11): 2416-2419. | |
[26] | TIAN Y L , GUO J , WU Y L ,et al. Towards attack and defense views of rational delegation of computation[J]. IEEE Access, 2019,PP(99):1. |
[27] | 杨义先, 钮心忻 . 安全通讯[M]. 北京: 电子工业出版社, 2018. |
YANG Y X , NIU X X . The general theory of information security[M]. Beijing: Publishing House of Electronics IndustryPress, 2018. | |
[28] | LIN W C , KE S W , TSAI C F . CANN:an intrusion detection system based on combining cluster centers and nearest neighbors[J]. Knowledge-Based Systems, 2015(78): 13-21. |
[29] | MOUSTAFA N , SLAY J . UNSW-NB15:a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)[C]// 2015 Military Communications and Information Systems Conference. Piscataway:IEEE Press, 2015: 1-6. |
[30] | MOUSTAFA N , SLAY J . The evaluation of network anomaly detection systems:statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set[J]. Information Security Journal A Global Perspective, 2016,25(1-3): 1-14. |
[31] | 彭凌西, 谢冬青, 付颖芳 ,等. 基于危险理论的自动入侵响应系统模型[J]. 通信学报, 2012,33(1): 136-144. |
PENG L X , XIE D Q , FU Y F ,et al. Automated intrusion response system model based on danger theory[J]. Journal on Communications, 2012,33(1): 136-144. |
[1] | Shenghai CHEN, Xiaoqin YAN, Sai LI, Liang YANG. Performance analysis of dual-hop PLC-FSO communication system [J]. Journal on Communications, 2021, 42(10): 243-250. |
[2] | Wei SUN,Peng ZHANG,Yongquan HE,Lichao XING. Attack detection method based on spatiotemporal event correlation in intranet environment [J]. Journal on Communications, 2020, 41(1): 33-41. |
[3] | Peng SONG,Caixia SU,Taifei ZHAO,Jinni CHEN,Lei ZHU,Xiaodan ZHANG. Channel capacity analysis of non-line-of-sight ultraviolet communication in noncoplanar geometry based on traversing tiny unit method [J]. Journal on Communications, 2019, 40(5): 144-152. |
[4] | Xinwei YAO,Mengna ZHANG,Chaochao WANG,Wanliang WANG. Modeling and analysis of multiple access channel capacity based on hybrid energy storage and energy harvesting [J]. Journal on Communications, 2018, 39(8): 150-159. |
[5] | Xin-yu LIU,Jian WENG,Yue ZHANG,Bing-wen FENG,Jia-si WENG. Android malware detection based on APK signature information feedback [J]. Journal on Communications, 2017, 38(5): 190-198. |
[6] | Chi ZHANG,Bi-qing ZENG,Jin-song YANG,Xiao-hong XIE. Requirements-oriented spectrum sharing for OFDMA cognitive radio networks [J]. Journal on Communications, 2015, 36(8): 192-206. |
[7] | Bing LI,Fan WEI,Bao-ming BAI,Xiao MA. Fundamental performance limits of CPM coded modulation system [J]. Journal on Communications, 2014, 35(3): 183-192. |
[8] | . Fundamental performance limits of CPM coded modulation system [J]. Journal on Communications, 2014, 35(3): 21-192. |
[9] | . Analysis of MIMO antenna array based on electromagnetic vector sensor [J]. Journal on Communications, 2013, 34(5): 1-11. |
[10] | Wan-tuan LUO,Xu-ming FANG,Meng CHENG,Xiang-juan ZHOU. Transmission scheme and capacity analysis of onboard multi-antenna system in high-speed train [J]. Journal on Communications, 2013, 34(3): 90-98. |
[11] | Xiao-bo XU,Qin-qin JIANG,Kang-feng ZHENG,Bin WU,Yi-xian YANG. IDS alert clustering algorithm based on chaotic particle swarm optimization [J]. Journal on Communications, 2013, 34(3): 105-110. |
[12] | Jie ZHOU,Jing-feng CHEN,Lin QIU,Kikuchi HISAKAZU. Effect of mutual coupling and antenna correlation on MIMO system in three-dimensional spatial channel models [J]. Journal on Communications, 2012, 33(6): 1-10. |
[13] | Yue-bing CHEN,Chao FENG,Quan ZHANG,Chao-jing TANG. Integrated artificial immune system for intrusion detection [J]. Journal on Communications, 2012, 33(2): 125-131. |
[14] | Wei-dang LU,Xuan-li WU,Xue-jun SHA,Nai-tong ZHANG. Resource allocation in OFDM fixed relay system with one relay multi-source [J]. Journal on Communications, 2011, 32(9): 26-32. |
[15] | Yue-heng LI,Jing ZHAO,Mei-yan JU,Xing-hui YIN. New method to improve the channel capacity and capacit ability of 4-element MIMO systems with close antenna spacing [J]. Journal on Communications, 2011, 32(6): 86-92. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|