期刊文献+

一种基于粗糙集属性约简的支持向量异常入侵检测方法 被引量:20

An Anomaly Intrusion Detection Technique of Support Vector Machine Based on Rough Set Attribute Reduction
下载PDF
导出
摘要 实现了一种粗糙集属性约简和支持向量机分类相结合的异常入侵检测方法。针对网络连接记录特征属性高维的特点,采用粗糙集属性约简的方法压缩数据空间,然后采用v-SVM两分类方法处理约简和正规化后的数据。基于DARPA1998数据源的实验表明,与采用全部属性的v-SVM两分类方法相比,该方法具有与之相当的分类精度,但有效地降低了检测时间,减少了存储空间。 This paper presented the implementation of a hybird anomaly intrusion detection technique based on rough set attribute reduction and support vector machine(SVM). According to the high dimension of network records with feature attributes,the rough set attribute reduction approach is firstly utilized to reducing data space and then the υ- SVM algorithm is introduced into processing normalized data set. Experiments on DARPA 1998 data set show that the proposed anomaly detection technique achieves a comparable precise detection rate as the υ-SVM algorithm based on all feature attributes, however, evidently decreases detection time as well as storage space.
出处 《计算机科学》 CSCD 北大核心 2006年第6期64-68,共5页 Computer Science
基金 国家自然科学基金项目(60372039) "十五"国防预研基金项目(41329080101)资助。
关键词 异常检测 粗糙集理论 属性约简 υ-SVM算法 异构值差度量(HVDM) Anomaly detection, Rough set theory, Attribute reduction, wSVM algorithm, Heterogeneous value difference metric(HVDM)
  • 相关文献

参考文献15

  • 1Lee W, StolfoSJ. Data mining approaches for intrusion detection [A]. In: Proceedings, Seventh USENIX Security Symposium, San Antonio, TX, 1998
  • 2Jha S,Tan K, Maxion R. Markov chains, classifiers and intrusion detection [A]. In: The 14th IEEE Computer Security Foundations Workshop, Canada, 2001. Proceedings, Seventh USENIX Security Symposium, San Antonio,TX, 1998
  • 3Balajinath B, Raghavan S. Intrusion detection through learning behavior model [J]. Computer Communications, 2001, 24 (12):1202-1212
  • 4Forrest S, Hofmeyr S A. Computer Immunology [J]. Communications of the ACM,1997,40(10): 88-96
  • 5Vapnik V N. The nature of statistical learning theory [M]. New York: Springer, 1995
  • 6Kim D S,Park J S. Network-based intrusion detection with support vector machines [A]. In: KahngH-K. Ed. ICOIN 2003,LNCS 2662,2003.,747-756
  • 7Sohn T,Seo J T, Moon J S. A study on the covert channel detection of TCP/IP header using support vector machines [A]. In:Qing S, Gollmann D, Zhou J. Eds. ICOIN 2003, LNCS 2836,2003. 313-324
  • 8Hu W J,Liao Y H,Vemuri V R. Robust anomaly detection using support vector machines [J]. IEEE Transaetrions on Pattern Analysis and Machine Intelligence. (in press)
  • 9Scholkopf B,Smola A,Williamson R C,et al. New support vector algorithms. Neural Computation[J]. 2000,12(5): 1207-1245
  • 10Lee W, Stolfo S. A framework for constructing features and models for intrusion detection systems [J]. ACM Transactions on Information and System Security,2000(3) :227-261

二级参考文献2

共引文献18

同被引文献147

引证文献20

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部