期刊文献+

基于支持向量机的异常入侵检测系统 被引量:7

Abnormal Intrusion Detection System Based on Support Vector Machines
下载PDF
导出
摘要 设计并实现了一种基于支持向量机(Support Vector Machines, SVM)的异常入侵检测系统。在先验知识(样本)较少的条件下该系统仍具有良好的推广能力。通过实验将其与神经网络检测模型进行对比,证实采用SVM进行入侵检测的有效性。当检测性能相同时,系统的训练时间大大缩短。 An intrusion detection system based on support vector machine is designed and implemented. The generalizing ability of intrusion detection system is still good when the priori knowledge is less (namely, the sample size is small). Comparison of detection ability between the above detection method and BP neural network shows that the intrusion detection system based on support vector machine can effectively detect intrusion and can dramatically shorten the training time under the same detection performance condition.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第18期43-45,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60273035) 国家"863"计划基金资助项目(2001AA11361) 江苏省自然科学基金资助项目(BK2002080)
关键词 入侵检测系统 支持向量机 系统调用 网络安全 Intrusion detection system Support vector machine(SVM) System call Network security
  • 相关文献

参考文献7

  • 1Tan K M C,Killourhy K S,Maxion R A.Undermining an Anomalybased Intrusion Detection System Using Common Exploits.RAID,2002:16-18
  • 2Lee S C,Heinbuch D V.Training a Neural-network Based Intrusion Detector to Recognize Novel Attacks.IEEE Trans.on Systems,Man,and Cybernetics,2001:294-299
  • 3Diettcrich T G.Ensemble Methods in Machine Learning.Cagliari,Italy:Proc.of the I st Intern,Workshop on Multiple Classifier Systems,2000:1-15
  • 4Joachims T.Estimating the Generalization Performance of a SVM Efficiently.Procecdings of the International Conference on Machine Learning,Morgan Kaufman,2000:431-438
  • 5Warrender C,Forrest S,Pearlmutter B.Detecting Intrusions Using System Calls:Alternative Data Models.IEEE Symposium on Security and Privacy,1999:133-145
  • 6Joachims T.SVM Light Is an Implementation of Support Vector Machines(SVMs) in C.University of Dortmund Collaborative Research Center on 'Complexity Reduction in Multivariate Data' (SFB475),http://ais.gm d.de/~thorsten/svm_light/,2000
  • 7张琨,许满武,张宏,刘凤玉.基于一种相对Hamming距离的入侵检测方法——RHDID[J].计算机学报,2003,26(1):65-70. 被引量:12

二级参考文献1

共引文献12

同被引文献60

引证文献7

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部