期刊文献+

采用自适应GHA神经网络的分类器设计 被引量:1

Classifier Design Using Adaptive GHA Neural Networks
下载PDF
导出
摘要 介绍了一种自适应逼近数据实质维的GHA神经网络学习算法。基于主元子空间分解的思想,给出了基于该算法的分类器刻画方法,对其中的刻画参数给出了详细的界定。该分类器采用监督学习机制进行训练,可以自动学习输入的主元特征子空间维数。在入侵检测领域,利用KDD CUP 1999数据集对该方法进行了仿真。采用正常连接数据训练GHA异常检测分类器,利用拒绝服务攻击数据进行了误用检测训练。并将测试结果与其他入侵检测方法进行了比较。 An adaptive Generalized Hebbian Algorithm (GHA) is presented which can be used to approach the intrinsic dimension of an input data set. The classifier design based on adaptive GHA networks is given in detail and the determination method of the classifier parameters is also described. The classifier can be trained by using supervised manner. We applied this approach to the domain of intrusion detection. Some simulations are carried out for anomaly detection by using labeled normal type network connections, and the misuse detection are performed on specified type attacks of denial-of-service intrusions All the training and testing datasets are based on the KDD CUP 1999 intrusion evaluation data set. Performance comparisons are also made with other recent published methods.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第6期1241-1244,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60471055) 教育部博士点基金(20040614017)
关键词 GHA算法 实质维 入侵检测 神经网络 主元分析 generalized hebbian algorithm intrinsic dimension intrusion detection neural network principal component analysis
  • 相关文献

参考文献11

  • 1SIMON H. Neural networks: a comprehensive foundation, second adition[M]. Canada: Prentice-Hall Inc, 1999.
  • 2SANGER T D. Optimal unsupervised learning in a single-layer linear feedforward neural networks[J]. Neural Networks, 1989, 12(3): 459-473.
  • 3DIAMANTARAS K I, KUNG S Y. Principal component neural networks: theory and applications[M]. New York USA: Wiley, 1996.
  • 4SHYU M, CHEN S, SARINNAPAKORN K, et al. A novel anomaly detection scheme based on principal component classifier[EB/OL]. http://www.cs.fiu.edu/-chens/PDF/ ICDM03_WS.pdf, 2003-05-11.
  • 5KUCHIMANCHI G K, PHOHA V V. Dimension reduction using feature extraction methods for real-time misuse detection systems[EB/OL]. http://www2.latech.edu/-phoha/ PDF%20Publications%20Folder/paper452.pdf, 2004-03-21.
  • 6LIU Gui-song, ZHANG Yi, YANG Shang-ming. A hierarchical intrusion detection model based on the PCA neural networks[J]. Neurocomputing, 2007, 70(7-9): 561- 568.
  • 7LIU Gui-song, ZHANG Yi. Intrusion detection using PCASOM neural networks[C]//Lecture Notes in Computer Science. Berlin: Springer, 2006: 240-245.
  • 8WUN-HUA C, SHEN-HSUN H, HANG-PIN S. Application of SVM and ANN for intrusion detection[J]. Computer & Operations Research, 2005, 32: 2617-2634.
  • 9LASKOV P, DUSSELL P. Learning intrusion detection: supervised or unsupervised[C]//Lecture Notes in Computer Science. Berlin: Springer, 2005: 50-57.
  • 10LU Jian-cheng, ZHANG Yi, TAN K K. Determining of the number of principal directions in a biologically plausible pea model[J]. IEEE Trans Neural Networks, 2007, 18(2): 910-916.

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部