期刊文献+

基于决策规则格的入侵检测 被引量:2

Intrusion Detection Basing on Decision Rule Lattice
下载PDF
导出
摘要 概念格是近年来获得飞速发展的数据分析的有力工具。本文对概念格进行扩展,提出了决策规则格的思想,并将其应用于入侵检测环境中,可以直接从决策规则格的格节点获取入侵行为模式。同时,将变精度粗糙集的β下近似思想应用于入侵检测规则获取,提出了β-约简,使入侵行为规则集的平均特征属性长度大大减小,而且规则集中规则的数目很少,可以有效、快速地实现对入侵行为分类,并能达到较高的分类正确率和很低的虚警率。 Concept lattice is a powerful data analytic tool, which develops quickly in recent years. A novel intrusion detection architecture based on Decision Rule Lattice, which is an extending of concept lattice, is proposed. This lattice structure can obtain the pattern of intrusion from lattice node directly. In addition, it applies β low approximation of variable precision rough set in intrusion detection rules, as well as provides β-reduction method which reduce average feature attribute length of intrusion activity rules and account of rules. Experimental results show that it can classify intrusion activities effectively and quickly with higher classification accuracy and lower false positive accuracy.
出处 《微电子学与计算机》 CSCD 北大核心 2005年第3期53-56,共4页 Microelectronics & Computer
关键词 决策规则格 概念格 β-致的决策规则 β-约简 Decision rule lattice, Concept lattice, β consistent decision rule, β-reduction
  • 相关文献

参考文献4

  • 1胡可云,陆玉昌,石纯一.概念格及其应用进展[J].清华大学学报(自然科学版),2000,40(9):77-81. 被引量:112
  • 2Fox K L, Henning R, etc. A Neural Network Approach towards Intrusion Detection. In Proceedings of the 13th National Computer Security Conference, Oct 1990:125~134.
  • 3杨向荣,沈钧毅,罗浩.人工免疫原理在网络入侵检测中的应用[J].计算机工程,2003,29(6):27-29. 被引量:17
  • 4Wille R. Restructuring Lattice Theory: An Approach Based on Hierarchies of Concepts. In: Rival I ed. Ordered Set.Dordrecht-Boston: Reidel, 1982: 445~470.

二级参考文献7

  • 1何球藻 吴厚生.医学免疫学[M].上海:上海医科大学出版社,2000..
  • 2Hu Keyun,Proceedings of PAKDD-99[C],1999年,109页
  • 3Hu Keyun,Proceedings of RSFDGr C99,1999年,443页
  • 4王志海,清华大学学报,1998年,38卷,增2期,14页
  • 5Ho T B,KDD:Techniques and Applications,1997年,49页
  • 6Ho T B,IEICE Trans Inf Syst,1995年,E78-D卷,5期,553页
  • 7杨向荣,宋擒豹,沈钧毅.基于行为模式挖掘的网络入侵检测[J].西安交通大学学报,2002,36(2):173-176. 被引量:5

共引文献127

同被引文献11

  • 1张威,魏冬生.基于Adaboost与支持向量机的人脸特征提取[J].微电子学与计算机,2007,24(5):69-72. 被引量:9
  • 2Cortes C, Vapnik V. Support vector networks [J ]. Machine Learning, 1995, 20(3) :273 - 297.
  • 3Huang C, Lee Y, Lin D, et al. Model selection for support vector machines via uniform design [ J ]. Computational Statistics & Data Analysis, 2007,52(1) : 335 - 346.
  • 4KDD99[EB/OL]. [2009 - 01 - 10]. http://kdd. ics. uci. edu/databases/kddcup99/kddcup99, html.
  • 5Wille R. Restructuring Lattice Theory: An Approach Based on Hierarchies of Concepts. In: Rival I ed. Ordered Set. Dordrecht-Boston: Reidel, 1982: 445~470.
  • 6Godin R, Missaoui R, Alaui H. Incremental Concept Formation Algorithm Based on Galois (concept) Lattices.Computational Intelligence, 1995, 11(2): 246~267.
  • 7Ziarko W. Variable Precision Rough Set Model. Journal of Computer and System Sciences, 1993.46(1): 39~59 .
  • 8张文修 吴伟志.粗糙集理论[M].北京:科学出版社,2001..
  • 9吕士颖,郑晓鸣,王晓东.基于量子粒子群优化的属性约简[J].计算机工程,2008,34(18):65-66. 被引量:6
  • 10胡可云,陆玉昌,石纯一.概念格及其应用进展[J].清华大学学报(自然科学版),2000,40(9):77-81. 被引量:112

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部