期刊文献+

基于熵的入侵检测特征参数选择 被引量:8

Selection intrusion detection parameters using entropy
下载PDF
导出
摘要 传统入侵检测的特征选择方法不但与评估数据的统计特性有关,还与检测算法有关。提出了一种独立于检测算法的入侵检测特征参数选择方法。该方法以入侵检测模型为基础,信息熵为准则。仿真结果显示出用所选特征参数进行检测,不但保证了检测的正确率,而且提高了检测速度,减小了内存资源的占用。 Feature selection methods for intrusion detection now available are influenced by the statistical characteristics of evaluation data and the detection methods. A feature selection method independent of detection method is presented. The method is based on the intrusion detection model and the entropy is used as the criterion. The simulation results show that it is effective to increase the detection speed and reduce of the memory, without sacrificing the detection correctness by using the selected features based on entropy.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2006年第4期599-601,610,共4页 Systems Engineering and Electronics
基金 "十五"军事通讯预研资助课题(4100104030)
关键词 网络安全 入侵检测 特征选择 network security intrusion detection entropy feature selection
  • 相关文献

参考文献7

  • 1Denning D E.An intrusion detection model[J].IEEE Trans.On Software Engineering,1987,13(2):222-232.
  • 2Forres S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[J].In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy,Los Alamitos,CA:IEEE Computer Society Press 1994:120-128.
  • 3Frank J.Artificial intelligence and intrusion detection:current and future directions[C] //Proceedings of the 17th National Computer Security Conference.1994.
  • 4Sung A H,Mukkamala S.Identifying important features for intrusion detection using support vector machines and neural networks[C]//In Proceedings of the 2003 International Symposium on Applications and the Internet Technology,IEEE Computer Society Press,2003:209-216.
  • 5Helman P,Liepins G.Statistical foundations of audit trail analysis for the detection of computer Misuse[J].IEEE Transactions on Software Engineering,2000,19(9):886-901
  • 6http://www-cse.ucsd.edu/users/elkan/clresults.html[DB].
  • 7饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134

二级参考文献6

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献133

同被引文献55

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部