期刊文献+

SVMENCL:一种入侵检测的新方法(英文)

SVMENCL:An Intrusion Detection Method
下载PDF
导出
摘要 在入侵检测中使用单个的支持向量机容易因"单点失效"而危害系统安全.提出一种基于支持向量机集成的方法来进行入侵检测.它采用负相关学习技术,在误差项中使用相关性惩罚因子使得生成的分类器有更好的多样性和精度;算法采用进化策略来自动地确定个体支持向量机的超参数,避免了需要了解问题的先验知识;最后,采用集成技术来组合个体支持向量机的检测结果.仿真实验表明这一方法有更好的检测性能,并且这种分布式并行检测方法有利于增加入侵检测系统的鲁棒性. The individual SVM is prone to fail in the intrusion detection for the fragility of being attacked. This paper addresses a method using a support vector machines ensemble approach based on negative correlation learning for intrusion detection. Using a correlation penalty term in the error function, the aggregate members can be accurate and diverse. And the evolutionary strategy is considered as the best way to automatically determine the individual SVMs hyperparameters. At last we combine the results of all individual SVMs using ensemble technique. This distributed parallel detectioncan strengthen the robustness of the system. Simulation results show the effectiveness of the method presented in this paper.
出处 《云南民族大学学报(自然科学版)》 CAS 2007年第3期247-251,共5页 Journal of Yunnan Minzu University:Natural Sciences Edition
基金 云南省自然科学基金资助项目(2005F0028Q) 云南省教育厅基金资助项目(5Y0588D,6Y0006D) 云南民族大学重点课程建设项目
关键词 人侵检测 负相关学习 集成 支持向量机 intrusion detection negative correlation learning ensemble support vector machine
  • 相关文献

参考文献9

  • 1VERWOERD T,HUNT R.Intrusion Detection Techniques and Approaches[J].Computer Communications,2002,25:1356-1365.
  • 2VAPNIK V N.The Nature of Statistical Learning Theory[M].New York:Springer-Verlag,1995.
  • 3SHAWE T J,CRISTIANINI N.Kernel Methods for Pattern Analysis[M].UK:Cambridge University Press,2004.
  • 4谷雨,徐宗本,孙剑,郑锦辉.基于PCA与ICA特征提取的入侵检测集成分类系统[J].计算机研究与发展,2006,43(4):633-638. 被引量:25
  • 5NUI Y J,CHEN L.Intrusive Detection Technology Based on Mixed Neural Networks[J].Control&Automation,2006,12-3:89-91.
  • 6KUNCHEVA L,WHITAKER C.Measures of Diversity in Classifier Ensembles and Their Relationship with the Ensemble Accuracy[J].Machine Learning,2003,51:181-207.
  • 7LIU Y,YAO X,HLIGUCHI T.Evolutionary Ensembles with Negative Correlation Learning[J].IEEE Trans Evolutionary Computation,2000,4(4):380-387.
  • 8HANSEN L K,SALAMON P.Neural Network Ensembles[J].IEEE Trans Pattern Analysis and Machine Intelligence,1990,12(10):993-1001.
  • 9BLAKE C L,MERZ C J.UCI Repository of Machine Learning Databases[EB/OL].1998,URL http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.htm.

二级参考文献11

  • 1谷雨,郑锦辉,孙剑,徐宗本.基于独立成分分析和支持向量机的入侵检测方法[J].西安交通大学学报,2005,39(8):876-879. 被引量:7
  • 2Z.H.Zhou.J.X.Wu.W.Tang.Ensembling neural networks:Many could be better than all? Artificial Intelligence,2002,137 (1/2):239~263
  • 3Y.Liu,X.Yao.Ensemble learning via negative correlation.Neural Networks,1999,12(10):1399~1404
  • 4C.L.Blake,C.J.Merz.UCI repository of machine learning databases.http:// kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,1998
  • 5E.Biermann,E.Cloete,L.M.Venter.A comparison of intrusion detection systems.Computers and Security,2001,20 (8):676~683
  • 6T.Verwoerd,R.Hunt.Intrusion detection techniques and approaches.Computer Communications,2002,25 (15):1356 ~1365
  • 7D.Joo,T.Hong,I.Han.The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors.Expert Systems with Applications,2003,25 (1):69~ 75
  • 8A.Hyv(a)rinen,E.Oja.Independent component analysis:Algorithms and applications.Neural Networks,2000,13 (4-5):411 ~430
  • 9V.N.Vapnik.The Nature of Statistical Learning Theory.Berlin:Springer-Verlag,1995
  • 10周志华,陈世福.神经网络集成[J].计算机学报,2002,25(1):1-8. 被引量:245

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部