期刊文献+

基于演化神经网络的战术数据链无线入侵检测技术研究

A Tactical Datalink Wireless Intrusion Detection Method Based on an Evolutionary Neural Network
下载PDF
导出
摘要 针对战术数据链无线网络典型入侵事件,基于演化算法和神经网络提出了一种基于演化神经网络的入侵检测方法。通过仿真实验和性能对比验证了该方法的有效性,对战术数据链系统的安全设计有一定的指导意义。 Based on the principles of evolutionary algorithms and neural networks, According to the typical in- trusion event in the tactical datalink wireless network, an intrusion detection method based on an evolutionary neural network was proposed. The efficacy of the proposed method was validated via experimental results, which offered auidance to the future securitv desian of tactical datalink svstems.
作者 陈明德 喻歆
出处 《中国新通信》 2013年第11期83-86,共4页 China New Telecommunications
关键词 战术数据链 无线入侵检测 演化算法 神经网络 Tactical Datalink, Wireless Intrusion Detection, Evolutionary Algorithms, Neural Networks
  • 相关文献

参考文献13

  • 1袁秀丽,周洪宇,周谷.世界网络战发展现状的初步研究[J].信息化研究,2010,36(8):20-21. 被引量:8
  • 2殷璐,严建钢,樊严.Link-16战术数据链抗干扰性能评估与仿真[J].航天电子对抗,2007,23(3):40-42. 被引量:6
  • 3林茂森,殷璐,李相全.JTIDS抗干扰性能与仿真[J].通信对抗,2007(1):36-39. 被引量:4
  • 4唐正军.人侵检测技术导论.北京:机械工业出版社,2004.16-85.
  • 5L. Li, D. Yang, F. Shen. A novel rule-based intrusion detection system using data mining [C] // Proceedings of 2010 IEEE International Conference onComputer Science and Information Technology, 2010,6: 169-172.
  • 6S. B. Cho. Incorporating soft computing techniques into a probabilistic intrusion detection system [J]. IEEE Transactions on Systems, Man,and Cyber-netics, Part C: Applications and Reviews, 2002, 32(2).: 154-160.
  • 7G. Zhu, J. Liao. Research of intrusion detection based on support vector machine [C] // Proceedings of International Conference on Advanced ComputerTheory and Engineering, 2008, 434-438.
  • 8S. J. Han, S. B. Cho. Evolutionary neural networks for anomaly detection based on the behavior of a program [J]. IEEE Transactions on Systems, Man, andCybernetics, Part B, 2006, 36(3).: 559-570.
  • 9L. Yu, B. Chen, J. Xiao. An integrated system of intrusion detection based on rough set and wavelet neural network [C] // Proceedings of the Third In-ternational Conference on Natural Computation, 2007, 3: 194—199.
  • 10T. P. Tran, T. Jan. Boosted modified probabilistic neural network (BMPNN). for network intrusion detection [C] // Proceedings of International JointConference on Neural Networks, 2006,2354-2361.

二级参考文献13

  • 1张海翔.美军联合战术信息分发系统作战使用[J].外军信息战,2006(5):45-52. 被引量:2
  • 2郑连清 刘增良 吴耀光.战场网络战[M].北京:军事科学出版社,2002.40-48.
  • 3总参谋部电子对抗部.透析网络战[M].北京:解放军出版社,2002.
  • 4Yao X.Review of evolutionary artificial neural networks[J].International Journal of Intelligent Systems,1993,8(4):539-567
  • 5Yao X.Evolving artificial neural networks[J].Proc of the IEEE,1999,87(9):1423-1447
  • 6Meng Xiaoping,Zhang Huaguang,Tan Wanyu.A hybrid method of GA and BP for short-term economic dispatch of hydrothermal power systems[J].Mathematics and Computers in Simulation,2000,51(3):341-348
  • 7M Annunziato,I Bertini,M Lucchetti,et al.Evolving weights and transfer functions in feed forward neural networks[C].EUNITE 2003,Oulu,Finland,2003
  • 8Enrique Alba,Francisco Chicano.Training neural networks with GA hybrid algorithms[G].In:Proc of the Genetic and Evolutionary Computation Conference (GECCO 2004),LNCS 3102.Berlin:Springer,2004.852-863
  • 9Kenneth O Stanley,Risto Miikkulainen.Efficient evolution of neural network topologies[C].The 2002 Congress on Evolutionary Computation (CEC'02),Piscataway,NJ,2002
  • 10Samuel Landau,Sébastien Picault.Stack-based gene expression[R].LIP6,Technical Report:LIP6 2002/011,2002

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部