期刊文献+

基于相空间重构和一类分类的异常入侵检测

Anomalydetection based on Phase Space Reconstruction and Oneclass Classification
下载PDF
导出
摘要 结合相空间重构理论与一类分类方法提出网络异常入侵检测方法。该方法首先将网络数据序列映射到相空间 ,然后对相空间中的数据点实行一类分类。最后根据 KKT条件进行异常检测。仿真实验结果表明了该方法的可行性和有效性。 A new method of network anomaly intrusion detection is proposed in this paper,which is based on phase space reconstruction theory and oneclass classification method.The method first maps network data to phase space,and then obtains a distinguish function by oneclass classification in phase space,finally anomalydetection is processed based on KKT conditions.The results of simulation experiments show the feasibility and effectiveness of the method.
出处 《电脑开发与应用》 2004年第8期11-12,共2页 Computer Development & Applications
关键词 相空间重构 一类分类 异常入侵检测 时间序列 oneclass classification,phase space,intrusion detection,time series
  • 相关文献

参考文献6

  • 1饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 2Smola A J,Scholkopf B. A tutorial on support vector regression [R]. NeuroCOLT TRNCTR98030, Royal Hollowy Coolege University of London,UK, 1998
  • 3Burges C J C. A Tutorial on Support Vector Machines for Pecognition [R]. Knowledge Discovery and Data Mining,1998,2(2) :17-18
  • 4Tax D. One - class classification[D]. phD thesis. Delf University of Technology, http://www. ph. tn. tudelft. nl/-davidt/thesis. pdf, 2001
  • 5Cess Diks. Nonlinear Time Series Analysis[M]. World Scientific Publishing Co. Pte. Ltd, 1999
  • 6S Forrest,S A Hofmeyr,A Somayaji et al. A sense of self for UNIX processes[A]. In Proceedings of the 1996 IEEE Symposium on Security and Privacy [C]. Los Alamitos,CA:1996:120-128

二级参考文献6

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献133

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部