期刊文献+

基于层次自组织特征映射的网络异常检测系统数据分析器 被引量:1

A DATA ANALYZER IN NETWORK ANOMALY DETECTION SYSTEM BASED ON HIERARCHICAL SELF-ORGANIZING MAP
下载PDF
导出
摘要 提出将层次自组织特征映射神经网络算法应用于网络异常检测,算法自顶向下逐层生成神经网络结构并细化聚类,将神经元的组织和连接方式从平面扩展到层次与平面连接相结合,大大加速了获胜神经元的搜寻过程。基于此种算法,设计并实现了网络异常检测系统中的数据分析器HSOMDA,在DARPA 1999数据集上的实验表明其具有较高的检测性能和时间性能。 This paper presents an application of a hierarchical self-organizing map (HSOM) algorithm for network anomaly detection. By growing in a top-down approach and extending the connections of neurons from horizontal dimension to both horizontal and hierarchical dimension, HSOM significantly accelerates the searching of winning neurons. Based on HSOM, a data analyzer in network anomaly detection system HSOMDA is designed and implemented. The results of experiments on DARPA 1999 dataset demonstrate its effectiveness and efficiency in anomaly detection.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第5期3-4,8,共3页 Computer Applications and Software
基金 国家自然科学基金项目(60403033)。
关键词 异常检测 聚类 层次自组织特征映射 Anomaly detection Clustering Hierarchical self-organizing map
  • 相关文献

参考文献7

  • 1J.Vesanto,E.Alhoniemi,Clustering of the self-organizing map.IEEE Transactions on Neural Networks,11(3),2000:586~600.
  • 2A.J.Hoglund,K.Hatonen,A.S.Sorvan,A computer host based user anomaly detection system using the self organizing map.Proceedings of the International Joint Conference on Neural Networks,IEEE IJCNN 2000,(5):411~416.
  • 3K.Labib and R.Vemuri,NSOM:A real-time network-based intrusion detection system using self-organizing maps.Technical report,Dept.of Applied Science,University of California,Davis,2002.
  • 4B.V.Nguyen,Self organizing map(SOM) for anomaly detection.Ohio University School of Electrical Engineering and Computer Science CS680 Technical Report,Spring 2002.
  • 5B.C.Rhodes,J.A.Mahaffey,and J.D.Cannady,Multiple self-organizing maps for intrusion detection.In Proceedings of 23rd National Information Systems Security Conference,2000.
  • 6L.Girardin,An eye on network intruder-administrator shootouts.In Proceedings of the Workshop on Intrusion Detection and Network Monitoring,Apr.1999.
  • 7J.Lampinen,E.Oja,Clustering properties of hierarchical self-organizing

同被引文献12

  • 1王坤,郭云飞.基于PCA的无监督异常检测方法研究[J].郑州大学学报(理学版),2004,36(4):39-42. 被引量:5
  • 2蒋盛益,李庆华,王卉,孟中楼.一种基于聚类的有指导的入侵检测方法[J].小型微型计算机系统,2005,26(6):1042-1045. 被引量:6
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 5Chen Yong, Jensen C, et al. Risk Probability Estimating Based on Clustering[C]//Proc. the 4th IEEE Annual Information Assurance Workshop. West Point, New York, USA,June 2003.
  • 6Liu Fang, Chen Yong, Dai Kui, et al. Research on Risk Probability Estimating using Fuzzy Clustering for Dynamic Security Assessment[C]//Duentsch Ivo et al. Eds. The 10th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. LNAI, Regina, Saskatchewan, Canada, September 2005
  • 7The American Heritage Dictionary of the English Language. Fourth Edition. Copyright 2000 by Houghton Mifflin Company
  • 8Lee C, Landgrebe D A. Analyzing High-dimensional Muttispectral Data[J].IEEE Transactions Geosci. Remote Sensing, 1993, 31(4) :792-800
  • 9Carreira-Perpinan M A. Continuous Latent Variable Models for Dimensionality Reduction and Sequential Data Reconstruction[D]. Ph. D Thesis. February 2001
  • 10Yeung K Y, Ruzzo W L. Principal Component Analysis for Clus tering Gene Expression Data. Bioinformatics [ M], 2001,7 (9) : 763-774

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部