期刊文献+

一种非纯净训练数据异常入侵检测方法 被引量:1

Anomaly Detection Method for Noisy Training Data
下载PDF
导出
摘要 异常入侵检测系统在训练阶段建立对象的正常行为模型,在测试阶段把它与对象的行为进行比较,如果出现了大于给定域值的偏差,就认为发生了入侵.通常建立对象正常行为模型的方法是用没有入侵的数据训练系统.这种方法存在实用性和可靠性方面的缺陷人工合成的训练数据基本可以保证没有攻击,但它与入侵检测系统将要实际工作的环境有很大的差别;而从实际使用环境提取的训练数据又不能保证不含有攻击.本文提出了一种基于网络的非纯净训练数据的异常入侵检测方法ADNTD(Anomaly Detection for Noisy Training Data),它通过过滤训练数据中的低概率特征域的方法过滤掉训练数据中的攻击数据并建立网络的正常行为模型,以保证即使训练数据含有攻击的情况下仍能取得较好的检测效果.实验结果显示在训练数据含有攻击时,ADNTD的性能明显好于以前的系统;在采用纯净数据训练时,ADNTD也具有与以前的系统相当的性能;ADNTD用带有攻击的数据训练的情况下仍能达到以前的同类系统用纯净数据训练相同的检测性能. Generally, in anomaly detection, Object's normal behavior model is built from training data without intrusions. But this kind of training data is not easy to get: First, if the data is produced by synthesis, it will be different from real data of target environment; if the data is obtained from target environment, it is difficult to ensure the data does not contain intrusions. In this paper, by exploiting the different probability distributions of intrusion and normal traffic in training data, a new network-based anomaly intrusion detection method is proposed. Compared with previous schemes, empirical experiments showing that with training data containing intrusions, the proposed method has higher detection rates. At the same time, for clean training data, the proposed method shows compared performance with previous schemes.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第3期437-441,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60373088)资助 国防研究基金项目(4131605)资助.
关键词 非纯净训练数据 入侵检测 异常检测 网络安全 noisy training data intrusion detection anomaly detection network security
  • 相关文献

参考文献10

  • 1Joanne Cummings.From Intursion Detection to Intrusion Prevention[EB/OL].http://www.nwfusion.com/buzz/2002/intruder.html,Network World,2002.
  • 2Lippmann,R.The 1999 DARPA off-line intrusion detection evaluation[J].Computer Networks,34(4) 579-595,2000.
  • 3Eleazar Eskin.Anomaly detection over noisy data using learned probability distributions[C].In:Proceedings of 17th International Conference on Machine Learning,255-262.Morgan Kaufmann,San Francisco,CA,2000.
  • 4Yongsu Park,Jaeheung Lee,Yookun Cho.Intursion detection using noisy training data[C].ICCSA 2004,LNCS 3043,547-556,2004.
  • 5Matthew Mahoney,Philip Chan.PHAD:packet header anomaly detection for identifying hostile network traffic[EB/OL].http://cs.fit.edu/~mmahoney/paper3.pdf,2001.
  • 6.[EB/OL].http://www.tcpdump.org/,1998.
  • 7Lawrence Ho L,David J.Cavuto.Adaptive and automated detection of service anomalies in transaction-oriented WANs:network analysis,algorithms,implementation,and deployment[J].IEEE Journal of Selected Areas in Communications 2000,18(5):745-757.
  • 8Marina Thottan,Chuanyi Ji,Anomaly detection in IP networks[J].IEEE Transactions on Signal Processing,2003,51(8):2191-2204.
  • 9Wu Ning-ning,Zhang Jing.Factor analysis based anomaly detection[C].Proceedings of the 2003 IEEE Workshop on Information Assurance,United States Military Academy,West Point,NY,108-115,2003.
  • 10Constantine Manikopoulos,Symeon papavassiliou.Network intrusion and fault detection:a statistical anomaly approach[J].IEEE Communications Magazine,October 2002,76-82.

共引文献2

同被引文献7

  • 1Roesch M. Snort-Lightweight Intrusion Detection for Networks. Proc of LISA 99, 1999.
  • 2Mahoney M, Chan PK. PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic.Florida Tech. Technica 1 Report 2001-04, http:// cs. fit.edu/-tr/.
  • 3SPADE, Silicon Defense, http://www.silicondefense. corn/software/spice/.
  • 4Debra A, Lunt TF, et al. Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES).Computer Science Laboratory SRI-CSL95- 06, May 1995. http://www.sdl.sri.eorrdpapers/5/s/5sri/5sri.pdf.
  • 5Wang K, Stolfo S. Anomalous payload-based network intrusion detection. In Recent Advances in Intrusion Detection, RAID 2004, September 2004:203 - 222.
  • 6Thorat SA, Khandelwal AK, Bezawada Bruhadeshwar, et al.Payload Content based Network Anomaly Detection. Applications of Digital Information and Web Technologies, 2008. ICADIWT 2008, First International Conference, 2008, 4- 6 Aug: 127- 132.
  • 7Mahoney MV. Network traffic anomaly detection based on packet bytes. ACMSAC, 2003,1(13):21 - 38.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部