期刊文献+

基于神经网络集成的入侵检测研究 被引量:3

Intrusion detection based on neural network ensemble
下载PDF
导出
摘要 提出一种新的基于神经网络集成的入侵检测方法。首先通过有区别地对待不同的训练数据训练神经网络,提高对小类别入侵的检测能力并防止网络训练中的退化现象;然后利用一种新的改进遗传算法优化集成网络的权,提高系统整体性能。理论和实验表明该方法具有较好的检测能力。 This paper put forward a new intrusion detection method based on neural network ensemble. First, we trained neural network by using different methods to deal with different data, to elevate the ability of detecting small intrusion and prevent neural network degeneration during training; then, the improved Genetic Algorithm was used to optimize neural network ensemble weight. Theory and experiment show that this method has better ability in intrusion detection.
出处 《计算机应用》 CSCD 北大核心 2007年第6期1363-1364,1367,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60373062 60573045)
关键词 入侵检测 遗传算法 神经网络集成 intrusion detection generation algorithm neural network ensemble
  • 相关文献

参考文献7

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2HORNIK KM,STINCHCOMBE M,WHITE H.Multilayer feed forward networks are universal approximators[J].Neural Networks,1989,2(2):359-366.
  • 3HANSEN LL,SALAMON P.Neural network ensembles[J].IEEE Transactions on Pattern Analysis and MachineIntelligence,1990,12(10):993-1001.
  • 4ZHOU Z-H,WU J-X.Ensemble neural networks:May could be better than all[J].Artificial Intelligence,2002,137(1 -2):239 -263.
  • 5李凯,黄厚宽.小规模数据集的神经网络集成算法研究[J].计算机研究与发展,2006,43(7):1161-1166. 被引量:10
  • 6吴建鑫,周志华,沈学华,陈兆乾.一种选择性神经网络集成构造方法[J].计算机研究与发展,2000,37(9):1039-1044. 被引量:27
  • 7PERRONE MP,COOPER LN.When networks disagree:Enable method for neural networks[J].In:Mammone R J eds.Artificial Neural Networks for Speech and Vision.London:Chapman-Hall,1993:126-142.

二级参考文献62

  • 1Liu Y,IEEE Transactions Systems Manand Cybernetics.B,1999年,29卷,6期,716页
  • 2LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 3LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 4KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 5LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 6An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 7ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 8The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 9KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 10Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.

共引文献265

同被引文献19

  • 1段友祥,王海峰,满成城.模糊逻辑在基于AIS的主机入侵检测中的应用[J].计算机工程与设计,2005,26(9):2540-2542. 被引量:6
  • 2Lou Der - Chyuan, Liu Chiang - Lung, Lin Chih - Lin. Message estimation for universal steganalysis using multi - classification support vector machine[ J]. Computer Standards & Interfaces, 2009, 31 (2) :420 -427.
  • 3Huang Cheng - Lung, Wang Chieh - Jen. A GA - based feature selection and parameters optimizationfor support vector machines [J]. Expert Systems with Applications, 2006,31 (2) :231 -240.
  • 4Anderson Alvarenga de Moura Meneses, Marcelo Domellas Machado, Roberto Schirru. Particle Swarm Optimization applied to the nuclear reload problem of a Pressurized Water Reactor [ J ]. Progress in Nuclear Energy, 2009,51 (2) :319 - 326.
  • 5S Suresh, P B Sujit, A K Rao. Particle swarm optimization approach for multi - objective composite box - beam design [ J ]. Composite Structures, 2007,81 (4) :598 - 605.
  • 6James P. Anderson. Computer Security threat monitoring and surveillance[R] Pennsylvania: James P. Anderson Com- pany, 1980.
  • 7Quinlan J R. Induction of Decision[J] Tree. Machine Learning, 1986(1): 81-106.
  • 8Quinlan J R. C4.5:Programs for Machine Learning [M]. San Francisco: Morgan Kaufmann Publishers, 1993.
  • 9Farid D M, Rahman M Z. Learning intrusion detection based on adaptive bayesian algorithm[C]//Procceedings of 11th International Conference on Computer and Information Technology. New York.. IEEE Press, 2008~652-656.
  • 10Hettich s, Bay S D. The U CI KDD Archive [OL]. (2000- 09-09) [2011-05-12] . http://kdd.ics.uci.edu/.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部