期刊文献+

一种基于多分类支持向量机的网络入侵检测方法 被引量:13

Network Intrusion Detection Method Based on Multi-Class Support Vector Machine
下载PDF
导出
摘要 构造了一种基于异构数据距离的径向基核函数,可直接应用于异构的网络数据,并利用实验数据得到修正的基于异构数据距离的径向基核函数(IHVDMRBF),从而减少了支持向量的个数,降低了运算量.采用IHVDMRBF核函数和一对一方法构造了多分类支持向量机来进行网络入侵检测,检测选用美国国防部高级研究计划局入侵检测评测数据.结果表明:与Ambwani方法比较,其检测精度提高了约3%,支持向量个数减少了268个,检测时间缩短了5min;与Lee方法比较,其拒绝服务攻击、远程到本地攻击和普通用户到超级用户攻击的检测精度分别高出73%、19%和3%. Based on heterogeneous value difference metric (HVDM), a radial basis function (RBF) named HVDM-RBF, was constructed to deal with heterogeneous network data directly. Using the experimental data, an improved HVDM-RBF was obtained as a new kernel function, I-HVDM-RBF, which decreases the number of support vectors and reduces the workload. The multi-class support vector machine was designed to detect network intrusion by using one-against-one method and I-HVDM-RBF. Defense Advanced Research Projects Agency intrusion detection evaluating data was used for detecting. The testing results show that the detection precision is increased by 3%, the number of support vectors and testing time are decreased about 268 and 5 minutes respectively by contrast with the Ambwani method and the detection precisions of denial-of-serve, remote-to-local, and user-to-root attacks are improved about 73%, 19% and 3% respectively compared with the method of Lee, which confirms the good performance of the proposed method.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2005年第6期562-565,共4页 Journal of Xi'an Jiaotong University
基金 国家重点基础研究发展规划资助项目(2001CB309403) 国家高技术研究发展计划资助项目(2001AA140213).
关键词 入侵检测 支持向量机 核函数 异构数据距离 Functions Radial basis function networks
  • 相关文献

参考文献10

  • 1Denning D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987,13(2):222-232
  • 2Vapnik V N. The nature of statistical learning theory[M]. New York: Springer-Verlag,1995.
  • 3Hsu C W, Lin C J. A Comparison of methods for multi-class support vector machines[J]. IEEE Transactions on Neural Networks, 2002, 13 (2): 110-119.
  • 4Wilson D R, Martinez T R. Improved heterogeneous distance functions[J]. Journal of Artificial Intelligence Research, 1997(6): 1-34.
  • 5李辉,管晓宏,昝鑫,韩崇昭.基于支持向量机的网络入侵检测[J].计算机研究与发展,2003,40(6):799-807. 被引量:79
  • 6Amari S, Wu S. Improving support vector machine classifiers by modifying kernel functions[J]. Neural Networks, 1999, 12(6):783-789.
  • 7School of information and computer science university of California. KDD cup 1999 data[EB/OL]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup.html,1999-10-28/2004-3-21.
  • 8Lee W, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models[A]. The 1999 IEEE Symposium on Security and Privacy, Berkeley, USA, 1999.
  • 9Chang C C, Lin C J. LIBSVM-a library for support vector machines[EB/OL]. http://www.csie.ntu.edu.tw/-cjlin/libsvm/, 2004-03-31/2004-05-25.
  • 10Ambwani T. Multi-class support vector machine implementation to intrusion detection[A]. The 2003 IEEE International Joint Conference on Neural Networks, Portland, USA, 2003.

二级参考文献1

  • 1张学工译.统计学习理论的本质[M].北京:清华大学出版社,1995..

共引文献78

同被引文献110

引证文献13

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部