期刊文献+

一种基于支持向量机的入侵检测模型 被引量:5

An Intrusion Detection Model Based on Support Vector Machine
下载PDF
导出
摘要 支持向量机(supportvectormachines)是一种建立在统计学习理论基础之上的机器学习方法。基于支持向量机在处理小样本、高维数及泛化能力强等方面的优势,该文提出了一种根据结构风险最小化原则基于支持向量机的入侵检测系统,首先简单介绍了入侵检测系统近来的发展状况和支持向量机的分类算法,然后给出以支持向量机分类算法为基础的入侵检测模型,以系统调用执行迹进行仿真实验,详细讨论了该模型的工作过程及核函数参数的选取对检测性能的影响。实验表明,该模型在先验知识较小的情况下,能够较好的检测出异常的入侵调用。 <Abstrcat>Support vector machine is a method of machine learning based on theory of statistics.The framework model proposed in this paper is a intrusion detection system based on support vector machine(SVM).First,the research process of intrusion detection and algorithm of SVM taxonomy are introduced.Then the model of an intrusion detection based on SVM is presented.System call trace data is used to emulate an intrusion detection experiment.The work process of this model is discussed and the choice of parameter of Kernel function is given to illustrate the performance of this model.The result of experiment shows that it can detect the abnormal intrusion under less prior knowledge.
作者 许劲松 覃俊
出处 《计算机仿真》 CSCD 2005年第5期43-45,55,共4页 Computer Simulation
关键词 入侵检测 支持向量机 分类器 核函数 Intrusion detection Support vector machine Classifer Kernel function
  • 相关文献

参考文献6

  • 1Manuel Davy.An Introduction to Support Vector Machines and Kernel Algorithms[R].MOUMIR,2002-10-11.
  • 2Thorsten Joachims.Making Large-Scale SVM Learning Practical[M]. MIT Press,Cambridge,USA,1998.
  • 3W Lee,S J Stolfo and P K Chan.Learning patterns from unix processes execution traces for intrusion detection[M].In In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. AAAi Press,1997.
  • 4Jungwon Kim and Peter J Bentley. Towards an Artificial Immune System for Network Intrusion Detection[C]:An Investigation of Dynamic Clonal Selection.IEEE Transactions on Evolutionary Computation,2002,4.
  • 5饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 6张磊,林福宗,张钹.基于支持向量机的相关反馈图像检索算法[J].清华大学学报(自然科学版),2002,42(1):80-83. 被引量:39

二级参考文献14

  • 1[1]Rui Y,Huang T S,Ortega M,et al.Relevance feedback: A power tool in int eractive content-based image retrieval [J].IEEE Trans on Circuits and Syst fo r Video Tech,1998,8(5): 644-655.
  • 2[2]Rui Y,Huang T S.A novel relevance feedback technique in image retrieval [A].Proc 7th ACM Int Conf on Multimedia (part 2) [C].Orlando,Florida,199 9.67-70.
  • 3[3]Ishikawa Y,Subramanya R,Faloutsos C.Mindreader: Query Databases Through Multiple Examples [A].Proc 24th Int Conf on Very Large Databases [C].New York,1998.218-227.
  • 4[4]Vapnik V.The Nature of Statistical Learning Theory [M].New York: Sprin ger Verlag,1995.
  • 5[5]Burges C J C.A tutorial on support vector machines for pattern recognitio n [J].Data Mining and Knowledge Discovery,1998,2(2): 1-47.
  • 6[6]Osuna E.Applying SVMs to face detection [J].IEEE Intelligent Systems,1998,13(4): 23-26.
  • 7[7]Chapelle O,Haffner P,Vapnik V.Support vector machines for histogram-bas ed image classification [J].IEEE Trans on neural networks,1999,10(5): 1057 -1064.
  • 8[8]Huang J,Kumar S R,Mitra M,et al.Image indexing using color correlogram s [A].Proc.of IEEE conf.on Computer Vision and Pattern Recognition [C].S an Juan,Puerto Rico,1997.762-768.
  • 9[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 10[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.

共引文献171

同被引文献42

引证文献5

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部