期刊文献+

入侵检测建模过程中特征提取最优化评估 被引量:2

Optimal Evaluation of Feature Selection in Intrusion Detection Modeling
下载PDF
导出
摘要 在入侵检测建模过程中,特征提取是一个重要的步骤。特征提取有利于提高入侵检测的效率和准确性,好的特征可以在特征空间提供完美的分类独立性。但在以往的入侵检测模型评估中,对原始数据的特征提取并没有涉及提取的标准和原则。文章利用KDD数据集,针对不同种类的网络入侵攻击,使用经典聚类算法对特征提取的特征类别进行比较,以获取该领域的知识。 Feature selection is an essential step in the process of intrusion detection modeling, Feature selection can improve the efficiency and the accuracy of Intrusion detection. Good features can provide excellent class separability. But in the historical researches, the criteria and the way about how to select the features in the raw data are seldom referred. In the thesis, classical clustering algorithm is used to evaluate the features selected and to approve the viewpoint based on KDD dataset.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第12期150-151,168,共3页 Computer Engineering
关键词 特征提取 聚类算法 异常检测 无指导学习 Feature selection Clustering algorithm Anomaly detection Unsupervised learning
  • 相关文献

参考文献8

  • 1Sengupta S,Andriamanalimanana B.Towards Data Mining Temporal Patterns for Anomaly Intrusion Detection Systems:Technology and Applications[C].IEEE International Conference on Intelligence Data Acquisition and Advanced Computing Systems,Lviv Ukraine,2003.
  • 2Lee W.A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems[D].New York:Graduate School of Arts and Sciences,Columbia University,1999.
  • 3向继,高能,荆继武.聚类算法在网络入侵检测中的应用[J].计算机工程,2003,29(16):48-49. 被引量:40
  • 4Yang Yingjie,Ma Fanyuan.An Unsupervised Anomaly Detection Patterns Learning Algorithm[C].Proceedings of International Conference on Communication Technology,2003,1:400-402.
  • 5梁铁柱,李建成,王晔.一种应用聚类技术检测网络入侵的新方法[J].国防科技大学学报,2002,24(2):59-63. 被引量:12
  • 6Guan Yu,Ghorbani A A,Belacel N.Y-Means:A Clustering Method for Intrusion Detection[C].The 2003 IEEE Canadian Conference on Electrical and Computer Engineering,Montreal,2003.
  • 7Zanero S,Savaresi S M.Unsupervised Learning Techniques for an Intrusion Detection System[C].Proceedings of 2004 ACM Symposium on Applied Computing,Nicosia,Cyprus,2004.
  • 8Lee Wenke,Stolfo S J,Chan P K.Real Time Data Mining-based Intrusion Detection[C].Proceedings of Second DARPA Information Survivability Conference & Exposition II,Anaheim,CA,2001.

二级参考文献14

  • 1Han Jiawei Kamber M.数据挖掘-概念与技术[M].高等教育出版社,2002..
  • 2HanJiawei KamberM.数据挖掘—概念与技术[M].高等教育出版社,2002..
  • 3Portnoy L, Eskin E,Stolfo S J.Intrusion Detection with Unlabeled Data Using Clustering. Philadelphia, PA:ln Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA,2001 ),2001.
  • 4Eskin E,Amold A,Prerau M A Geometric Framework for Unsupervied Anomaly Detection: Detecting Intrusions in Unlabeled Dala.CUCS Technical Report,2002.
  • 5Application of Data Mining to Intrusion Detection.http://www.isse.gmu.ed u/-csis/infs765/handouts/handout 12.pdf,2000.
  • 6Barbara D.ADAM:Detecting Intrusions by Data Mining.Proceedings of IEEE Workshop on Information Assurance and Security,2001.
  • 7Kdd99 Cup dataset.http://kdd.ics:uci.edu/databases/kddcup99/kddcup99.html, 1999.
  • 8张平安 高春华 译.神经-模糊和软计算[M].西安交通大学出版社,2000.8-63.
  • 9Eskin E. Anomaly detection over noisy data using learned probability distributions[A]. Proceedings of the International Conference on Machine Learning, 2000.
  • 10Axelsson Stefan. Intrusion Detection Systems: A Survey and Taxonomy[EB]. http://citeseer.nj.nec.com/sc, 2000.

共引文献48

同被引文献5

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部