期刊文献+

基于聚类的网络入侵检测系统模型

The Network Intrusion Detection System Model Based on Clustering
下载PDF
导出
摘要 入侵检测中对未知入侵的检测主要是由异常检测来完成的,传统异常检测方法需要构造一个正常行为特征轮廓的参考模型,但建立该特征轮廓使系统的开销巨大.对此,提出一种针对网络入侵检测的聚类算法,该方法的优点在于不需要用人工的或其他的方法来对训练集进行标识.在检测过程中,随着有效信息的不断增加,模型得到了更新,使增量聚类后的新模型与原有模型的检测性能相比,有很大提高. It is accomplished by abnormal detection to detect the uncertain intrusion in the intrusion detection. Traditional abnormal detection methods need a reference model with a profile of normal action, but build the character profile are more difficult. So this paper puts forward to network intrusion detection in combination with clustering algorithm. The benefit of the algorithm is that it needn't labeled training data sets by hand or other methods. And in the detection the model may be incremental updated by the increasing useful information. So the new model after incremental clustering is more highly detective than the original model.
作者 周英 孙名松
出处 《哈尔滨理工大学学报》 CAS 2007年第1期39-42,46,共5页 Journal of Harbin University of Science and Technology
基金 黑龙江省自然科学基金资助项目(F0306)
关键词 入侵检测 无监督异常检测 聚类 intrusion detection unsupervised anomaly detection clustering
  • 相关文献

参考文献3

二级参考文献17

  • 1MERZ CJ, MERPHY P. UCI repository of machine learning databases[ EB/OL]. http://www. ics. uci. edu/mlearn/MLRRepository. html, 2004.
  • 2LI XY. Clustering and classification algorithm for computer intrusion detection[ M]. Ph D, thesis, Arizona state university, 2001.
  • 3ELKAN C. Results of the KDD'99 Classifier Learning Contest[ EB/OL]. http://www. cs. ucsd. edu/users/ elkan/clresults. html,2004.
  • 4HAWKINS D. Identification of Outliers[ M]. Chapman and Hall,London, 1980.
  • 5BARNETT V, LEWIS T. Outliers in statistical data[ M]. John Wiley, 1994.
  • 6BICKEL DR. Robust estimators of the mode and skewness of continuous data[ J]. Computational Statistics and Data Analysis, 2002, 39(2): 153 - 163.
  • 7ARNING A, AGRAWAL R, RAGHAVAN P. A Linear Method for Deviation Detection in Large Databases[ A]. Proc 2nd Int Conf on Knowledge Discovery and Data Mining[C], Portland, OR, AAAI Press, 1996. 164 - 169.
  • 8SARAWAGI S, AGRAWAL R, MEGIDDO N. Discovery-Driven exploration of OLAP data cubes[ A]. Proc 6th Int Conf on Extending Database Technology[ C]. Valencia: Springer - Verlag, 1998.168 -182.
  • 9HE ZY, XU XF, DENG SC. Discovering cluster-based local outliers [J]. Pattern Recognition Letters, 2003, 24(9 - 10): 1651 - 1660.
  • 10KNORR EM, NG RT. A Unified Approach for Mining Outliers[ A].Proceedings of the 7th CASCON[ C], 1997.236 -248.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部