期刊文献+

演进模糊神经网络在非监督式异常检测中的应用

Applying evolving fuzzy neural network to network unsupervised anomaly detection
下载PDF
导出
摘要 目前的入侵检测系统主要采用的是基于特征的误用方法.近几年出现的基于数据挖掘技术的异常检测方法则需要依靠带标识的训练数据来保证检测效果,然而在现实应用中,训练数据往往是难以获取的,另外,基于异常检测的入侵检测系统面临的另外一个难题是用户的正常行为往往是随着时间而改变的,系统必须能够自适应的更新来适应这些改变,辨别出哪些是正常行为的变化哪些是攻击行为.文中提出了一种采用演进的模糊神经网络(EFuNN)的非监督式异常检测新方法,该方法具有独特的优势,它无需大量的带标识的,用于标明各种攻击的训练数据,而只需要寻找和定义正常的分类,因此,它可以在无需先验知识的情况下,在线式的,自适应的发现异常行为,文章最后采用KDD CUP99的测试数据集对该方法进行了评估,证实了该方法在网络异常检测中的有效性. Most current intrusion detection system adopt signature-based methods or data mining-based methods, which rely on labeled training data, however, in practice, this training data is typically expensive to produce. Another difficulty of anomaly-based intrusion detection system is that patterns of normal behavior vary with the time and the system must be able to adapt to these changes, and be able to distinguish these changes in normal behavior from intrusive behavior. This paper discusses the creation of an unsupervised anomaly detection system that uses EFuNN to detect anomalies in network connections. Such a system can work without massive sets of pre-labeled training data. It has added versatility Of being free of the overspecialization that comes with systems tailored for specific sets of attacks. Therefore, the system can update the normal profile in an online, adaptive fashion. In the end, the method is evaluated by experimenting on the network records from the KDD CUP99 data set.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2006年第B07期51-54,共4页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(60573101) 陕西省自然科学基金资助项目(2005f43).
关键词 异常检测 入侵检测 网络安全 神经网络 anomaly detection intrusion detection network security neural network
  • 相关文献

参考文献6

  • 1高翔,王敏,胡正国.基于数据挖掘技术的入侵检测系统的研究[J].西北工业大学学报,2003,21(4):395-397. 被引量:17
  • 2AHMET B,AMBUJ K.SINGH.A unified framework for monitoring data streams in real time[A].Proceedings of the 21st International Conference on Data Engineering[C].Washington,DC,USA,2005.
  • 3SEMARY A,EDMONDS J.A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems[A].The 2005 IEEE International Conference on Fuzzy Systems[C].Reno,Nevada,2005.
  • 4ESKIN E,ARNOLD A.A geometric framework for unsupervised anomaly detection:Detecting intrusions in unlabeled data[EB/OL].http://citeseer.ist.psu.edu/eskin geometric.html,2002-07-09/2005-12-23.
  • 5NASRAOUI O,LEON E A.Detection based on unsupervised niche clustering with application to network intrusion detection[A].In Proceedings of the Congress of Evolutionary Computation[C].San Diego,USA,2004.
  • 6GAO Xiang,WANG Min.Applying fuzzy data mining to network unsupervised anomaly detection[A].International Symposium on Communications and Information Technologies[C].Beijing,China,2005.

二级参考文献3

  • 1LeeW.A Data Mining Framework for Constructing Features and Models for Intrusion Detection System: [PhD thesis]. New York: Columbia University, 1999, 22-26.http://www, cs. columbia, edu/-wenke/.,.
  • 2LeeW StolfoSJ.Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio:. 1998, 6-9.http://www, cs. columbia, edu/-wenke/.,.
  • 3Han Jiawei Kamber M.数据挖掘概念与技术[M].北京:机械工业出版社,2001..

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部