期刊文献+

基于支持向量数据描述的异常检测方法 被引量:17

Anomaly Intrusion Detection Method Based on SVDD
下载PDF
导出
摘要 提出了一种基于支持向量数据描述算法的异常检测方法。该方法将入侵检测看作是一种单值分类问题,建立正常行为的支持向量描述模型,通过该模型可以检测各种已知和未知的攻击行为。该方法是一种无监督的异常检测方法,能够在包含噪声的数据集进行模型训练,降低了训练集的要求。在KDD CUP'99 标准入侵检测数据集上进行实验,并与无监督聚类异常检测实验结果相比较,证实该方法能够获得较高检测率和较低误警率。 This paper proposes a new anomaly intrusion detection method based on support vector data description (SVDD ). According to this method, intrusion detection is regarded as one-class classification problem. A support vector description model is built for normal data, and then known and unknown attacks can be detected using this model. This method falls into the category of unsupervised anomaly detection techniques as it can train the model with unlabeled and noisy data. Results from preliminary experiments with the KDD CUP'99 network data indicate that the method has satisfying performance.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第3期39-42,共4页 Computer Engineering
基金 国家自然科学基金资助项目(66973034 90104005)
关键词 异常检测方法 支持向量 入侵检测 数据集 描述模型 无监督聚类 数据描述 法能 正常 行为 Network security Intrusion detection Anomaly detection Support vector data description(SVDD) Support vector machine(SVM)
  • 相关文献

参考文献14

  • 1Denning D E. An Intrusion Detection Model. IEEE Transactions orSoftware Engineering, 1987, 13(2):222-228
  • 2Hofmeyr S A. An Immunological Model of Distributed Detection and Its Application to Network Security [Ph.D. Thesis]. University of New Mexico, 1999
  • 3Lee W, Stolfo S J, Mok K W. A Data Mining Framework for Building Intrusion Detection Models. In Proceedings of the IEEE Symposium on Security and Privacy, 1999:120-132
  • 4Ghosh A, Wanken J, Charron F. Detecting Anomalous and Unknown Intrusions Against Programs. In Proceedings of the 1998 Annual Computer Security Applications Conference, 1998:259-267
  • 5Mukkamala S, Janoski G I, Sung A H. Intrusion Detection Using Neural Networks and Support Vector Machines. In Proceedings of IEEE International Joint Conference on Neural Networks, 2002:1702
  • 6陈光英,张千里,李星.基于SVM分类机的入侵检测系统[J].通信学报,2002,23(5):51-56. 被引量:40
  • 7饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 8Hu W, Liao Y, Vemuri V R. Robust Support Vector Machines for Anomaly Detection in Computer Security. In Proceddings of Conference on Machine Learining and Application, 2003
  • 9Tax D M J, Duin R P W. Support Vector Domain Description, Pattern Recognition Letters, 1999,20(11-13):1191-1199
  • 10Burgcs C J C. A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery, 1998, 2(2): 121

二级参考文献7

  • 1张千里.CCERT的建议和入侵检测系统的研究[M].北京:清华大学,2000..
  • 2[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 3[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 4[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 5[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 6[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 7[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献166

同被引文献132

引证文献17

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部