期刊文献+

基于机器学习的入侵检测方法实验与分析 被引量:8

Experiments and analysis for intrusion detection method based on machine learning
下载PDF
导出
摘要 入侵检测系统(IDS)是保障信息安全的重要手段。分析了机器学习应用于网络连接级的异常检测模型的过程,然后建立了异常检测系统原型,以验证此方法用于IDS的可能性及所能达到的性能。实验以DARPA网络数据为例,对数据的特征进行了分析、选取及构造,并针对多种情况进行了测试。实验结果表明,该IDS系统具有很好的检测性能。最后对结果进行了分析,并得出了几个有用的结论。 Intrusion detection system(IDS)is a very important instrument in the domain of information security.Machine learning was used to construct an IDS model on network connection level in order to test the feasibility and its performance.Ex- perimental results using a set of benchmark data from DARPA have shown that the performances of this anomaly detection system are fairly high.At the end,some useful conclusions were drawn according to the results.
出处 《计算机工程与设计》 CSCD 2004年第5期694-696,共3页 Computer Engineering and Design
基金 普天首信重大科研基金(021125)
关键词 机器学习 入侵检测方法 入侵检测系统 IDS 异常检测模型 分类模型 IDS machine learning anomaly detection classification
  • 相关文献

参考文献6

  • 1Lane T, Brodley C E. An application of machine learning to anomaly detection [C]. Baltimore, MD: Proceedings of the 20th National Information Systems Security Conference,1997. 366-377.
  • 2Mitchell T. Machine leaming [M]. NewYork: McGraw-Hill,1997.
  • 3Quinlan J R, Cameron-Jones R M. FOIL: A midterm report [R]. Spring-Verlag: Machine Learning ECML-93, Lecture notes in Computer Science #667, 1993.
  • 4William W Cohen. Fast effective rule induction [C]. Lake Taho, CA: In Machine Learning: the 12th International Conference, 1995.
  • 5MIT Lincoln Labs. 1998 DARPA intrusion detection evaluation [DB/OL]. http:∥www. ll.mit.edu/IST/ideval/index.html.
  • 6梁铁柱,李建成,王晔.一种应用聚类技术检测网络入侵的新方法[J].国防科技大学学报,2002,24(2):59-63. 被引量:12

二级参考文献7

  • 1张平安 高春华 译.神经-模糊和软计算[M].西安交通大学出版社,2000.8-63.
  • 2Eskin E. Anomaly detection over noisy data using learned probability distributions[A]. Proceedings of the International Conference on Machine Learning, 2000.
  • 3Axelsson Stefan. Intrusion Detection Systems: A Survey and Taxonomy[EB]. http://citeseer.nj.nec.com/sc, 2000.
  • 4Bonifacio J M, Cansian A M. Neural Networks Applied in Intrusion Detection Systems[EB]. http://citeseer.nj.nec.com/sc, 2000.
  • 5Lee W , Stolfo S J. Data Mining approaches for intrusion detection[A]. Proceedings of the 1998 USENIX Security Symposium, 1998.
  • 6KDD Cup 1999 Data[EB]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. 1999.
  • 7蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:369

共引文献11

同被引文献76

引证文献8

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部