2016
DOI: 10.1007/bf03391573
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion-detection model integrating anomaly with misuse for space information network

Abstract: Abstract:In recent years, following the development of space commutation, space information has become a critical part in space information network and will play a very significant role in winning future information war. A space information network with characteristics such as complex structure, special communication requirement, long delay, dependence on remote maintenance, and fragile ecological environment contains enormous security risks. Therefore, ensuring space information network safety is important. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…(3) Reduce the dimension of feature vectors in the sample data set using SDAE network. (4) The processed data set is used to train the OS-ELM classifier which is used to detect the anomaly network. The OS-ELM training process can be subdivided into the following steps.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(3) Reduce the dimension of feature vectors in the sample data set using SDAE network. (4) The processed data set is used to train the OS-ELM classifier which is used to detect the anomaly network. The OS-ELM training process can be subdivided into the following steps.…”
Section: Related Workmentioning
confidence: 99%
“…Any unknown or illegal user can access the LAN through the network access point, but the existing firewall strategy cannot meet the requirements of high security. Therefore, anomaly detection method becomes a reasonable supplement to firewall, and only real-time IDS can maximize the detection of network abnormal behaviors [2][3][4][5]. In recent years, scholars have proposed a variety of anomaly detection methods based on data mining.…”
Section: Introductionmentioning
confidence: 99%