搜索资源列表
NICA
- 在matlab实现 网络入侵聚类算法 很好用的东西-In the matlab network intrusion clustering algorithm Useful things
Kohonen-Network
- 基于Kohonen网络的聚类算法——网络入侵聚类-Clustering Algorithm Based on Kohonen Network- Network Intrusion Clustering
code
- FUZZY LOGIC BASED INTRUSION DETECTION SYSTEM.
NSL-KDD
- 这是KDD数据的改进版。进行网络入侵检测的研究生人员可以下载。-This is an improvement of the KDD data. And, if you are interested in the intrusion detection, you can download this data file freely.
mianyiyichuan
- 该算法既保留了遗传算法的搜索特性,又利用了免疫算法的多机制求解多目标函数最优解的自适应特性,在很大程度上避免了“早熟”,收敛于局部极值。 生物体的免疫系统是一个高度进化、复杂的系统,它能自适应地识别和排除入侵肌体的抗原性异物,保护机体免受损害及维持内坏境稳定,并具有学习、记忆和自适应调节的能力。当抗原入侵时,免疫系统通过自体耐受对‘自己’和‘非己’进行识别,并产生最恰当的抗体排除抗原,通过抗体与抗体之间、抗原与抗体之间的相互刺激和抑制关系,降低抗原对免疫细胞的刺激,抑制抗体的过度分化、增殖,
rkhunter-1.4.2.tar
- Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems. Very useful in detecting intrusion and os file changes-Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems. Very useful in detecting i
IWO_Kohonen
- 基于杂草算法Kohonen网络入侵检测 -Weeds algorithm based on Kohonen network intrusion detection
idsaodv
- intrusion detection system in aodv protocol
Kohonen
- 基于Kohonen网络的聚类算法—网络入侵聚类-Clustering algorithm based on Kohonen network- network intrusion clustering
Release
- 一个用MFC做的入侵检测系统,鼠标选定监测区域,若有物体入侵发生报警-MFC to do with a intrusion detection systems, monitoring area selected by the mouse, if the object of the invasion alarm
Kdd-DT-NN
- network intrusion detection using decision tree for feature selection and neural network classifier
julei
- 利用广义神经网络的聚类算法来解决网络的入侵归类问题-Clustering algorithm uses generalized neural networks to solve the problem of network intrusion classification
Network-Tools
- 【常用网络工具】网络扫描软件Nmap;网络监听工具wireshark;入侵检测系统Snort;-[commonly used network tools] network scanning software Nmap network monitoring tool Wireshark intrusion detection system Snort
suricata-3.1.2.tar
- 入侵检测和防御相关,真实suricata源码-Intrusion detection and prevention of related real suricata source
kohonen
- 对于大数据学习的同学,本案例具有非常好的引领作用,特别适合初学者!非常实用!该案例为网络聚类算法,适合研究网络入侵聚类。-For large data learning of students, this case has a very good leading role, is particularly suitable for beginners! Very practical! The case for the network clustering algorithm, is suitab
deccision-tree
- intrusion detectio system signature matching
Apriori-master
- 用Apriori算法挖掘出入侵检测数据集KDD99的数据关联性,从而检测出未知的攻击-Apriori algorithm is used to extract the data association of the intrusion detection data set KDD99, and the unknown attack is detected
Multi-Agent-Based-IDS-for-WSN
- 本文提出一种无线传感器网络入侵检测解决方案针对分簇式无线传感器网络的特点, 通过让节点和簇头分别执行不同检测任务, 结合本地检测和联合检测, 并采用多个代理模块分别实现数据收集、分析检测和入侵响应和代理管理的任务,是一套完整的IDS体系。-This paper proposes a wireless sensor network intrusion detection characteristics solutions cluster wireless sensor network, data
Group-based-IDS-for-WSN
- 该文提出了一种轻量、高效、灵活的分组入侵检测方案。在该方案中, 整个传感器网络被划分成若干物理位置临近、具有相似观测结果的分组, 组内各传感器节点同时观测其它节点的多个属性, 以便精确地检测各种攻击行为。-This paper proposes a lightweight, efficient and flexible packet intrusion detection scheme. In this embodiment, the entire sensor network is divid
A-survey-of-IDS
- 无线传感器网络入侵检测系统的综述,对多种入侵检测方法进行了描述-Review of wireless sensor network intrusion detection system, the plurality of intrusion detection methods are described