期刊文献+

基于粗集理论和SVM算法的入侵检测方法研究 被引量:4

Research of Intrusion Detection Method Based on Rough Set and SVM Algorithm
下载PDF
导出
摘要 提出了一种将粗集方法与SVM算法结合起来的入侵检测方法。利用粗集理论在处理大数据量、消除冗余信息等方面的优势,减少SVM训练数据,克服SVM算法因为数据量大,处理速度慢等缺点。同时,借助于SVM良好的分类性能,对粗集约简后的最小属性子集进行分类,实现入侵检测的快速性能,高检测率和抗噪声强等优点。实验结果表明,该方法优于其它同类方式。 This paper proposes an intrusion detection method which combines rough set and SVM algorithm. In virtue of the ability rough set has to decease the amount of data and get rid of redundancy, the method can reduce amount of training data used and overcome SVM's defect of slow running speed when process large data set. At the same time, by the aid of SVM algorithm the method can classify the core of property set as to have extensiveness and high identification rate, and avoid disturbance. Experimental results show this method is better than other methods reported in the literature in terms of detection resolution.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第8期157-158,170,共3页 Computer Engineering
关键词 相集 SVM算法 网络安全 入侵检测 Rough set Support vector machine (SVM) Network security Intrusion detection
  • 相关文献

参考文献6

  • 1蔡忠闽,管晓宏,邵萍,彭勤科,孙国基.基于粗糙集理论的入侵检测新方法[J].计算机学报,2003,26(3):361-366. 被引量:57
  • 2饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 3Forrest S,Perrelason A S. Allen L,et al. Self-nonself Discrimination in a Computer. In: Rushby J,Meadows C(Eds.),Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy,Oakland,CA: IEEE Computer Society Press,1994: 202-212.
  • 4Ghosh A K,Michael C,Schatz M. A Real-time Intrusion System Based on Learning Program Behavior. In: Debar H,Wu SF(Eds.),Recent Advances in Intrusion Detection (RAID 2000),Toulouse: Spinger-Verlag,2000: 93-109.
  • 5Lee W,Stolfo S J. A Data Mining Framework for Building Intrusion Detection Model. In: Gong L,Reiter MK,(Eds.),Proceedings of the 1999 IEEE Symposium on Security and Privacy,Oakland,CA: IEEE Computer Society Press,1999: 120-132.
  • 6Vapnik V N. The Nature of Statistical Learning Theory. New York: 码Spring-Verlag,1995.

二级参考文献14

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 7Bace R. Intrusion Detection. New York: Macmillan Technical Publishing, 2000
  • 8Forrest S, Hofmeyr S A et al. A sense of self for Unix processes. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996. 120~128
  • 9Cohen W W. Fast effective rule induction. In: Proceedings of the 12th International Conference, Lake Taho, California, 1995. 115~123
  • 10Lee W, Stolfo S, Chan P. Learning patterns from Unix process execution traces for intrusion detection. In:Proceedings of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, 1997. 191~197

共引文献177

同被引文献23

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部