期刊文献+

基于免疫算法与支持向量机的异常检测方法 被引量:7

Anomaly detection approach based on immune algorithm and support vector machine
下载PDF
导出
摘要 在异常检测中,应用支持向量机算法能使检测系统在小样本的条件下具有良好的泛化能力。但支持向量机的参数取值决定了其学习性能和泛化能力,且大量无关或冗余的特征会降低分类的性能。基于此,提出了一种基于免疫算法的支持向量机参数和特征选择联合优化的方法。免疫算法是一种新的有效随机全局优化技术,它具有不易陷入局部最优、解的精度高、收敛速度快等优点。仿真结果表明算法在提高异常检测的检测正确率的同时相应的测试时间也在缩短。 In anomaly detection, utihzing support vector machines can make detection system have good generalization ability in situation of small sample. But appropriate parameters are very crucial to the learning results and generalization ability of support vector machines. And many irrelevant and redundant features degrade the performance of classification. Thus an approach that applied immune algorithm to optimize parameters of SVM(Support Vector Machine) and feature selection was proposed. Immune algorithm is an efficient random global optimization technique. It has nice performances such as avoiding local optimum, high precision solution, and quick convergence. The simulation results show that immune algorithm can improve the detection accuracy and meanwhile shorten the testing time.
出处 《计算机应用》 CSCD 北大核心 2006年第9期2145-2147,共3页 journal of Computer Applications
关键词 异常检测 支持向量机 泛化能力 免疫算法 亲和力 anomaly detection SVM(Support Vector Machine) generalization performance immune algorithm affinity
  • 相关文献

参考文献8

  • 1饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 2FRONHLICH H, CHAPELLE O. Feature selection for support vector machines by means of genetic algorithms[ A]. Proceedings of the 15th IEEE international conference on tools with artificial intelligence[ C], 2003. 142 - 148.
  • 3KEERTHI S. Efficient tuning of SVM hyperparameters using radius/margin bound and iterative algorithms[ J]. IEEE transactions on neural network, 2002, 13(5) : 1225 -1229.
  • 4CHUNG KM, KAO WC, SUN T. Radius margin bounds for support vector machines with the RBF kernel [ J]. Neural Computation,2003, 15(11) : 2643 -2681.
  • 5MORI K, TSKUKLYAMA M, FUKUDA T. Immune algorithm with searching diversity and it's application to resource allocation problem[ J]. Transactions of the Institute of Electrical Engineers of Japan,1993, 113(10) : 872 -878
  • 6VAPNIK V, Statistical Learning Theory[ M]. New York: John Wiley and Sons, 1998.
  • 7CORTES C, VAPNIK V. Support vector networks[ J]. Machine Learning, 1995, 20(1) : 273 -297.
  • 8CHAPELLE O, VAPNIK V, BOUSQET O. Choosing Multiple Parameters for Support Vector Machines [ J]. Machine Learning,2002, 46(1) : 131 - 159.

二级参考文献6

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献133

同被引文献62

引证文献7

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部