期刊文献+

基于支持向量机与移动Agent的入侵检测系统模型 被引量:4

Intrusion Detection System Model Based on Support Vector Machine and Mobile Agent
下载PDF
导出
摘要 目前要发展新的入侵检测系统必须解决检测准确性、高效性的问题,同时要考虑分布式智能化的检测方法.提出一种采用基于支持向量机与移动Agent技术的入侵检测系统模型,利用支持向量机对小样本、高维非线性数据良好的分类性能,将其作为检测工具;利用移动Agent的智能性、移动性,在网络节点间进行迁移检测入侵.给出了相应的模型结构. To develop a new IDS, the problem of detecting accuracy and efficienly need to be solved, and intellectualized distributed detecting method should be put into consideration. In this paper, we bring forward an IDS based on Support Vector Machine and mobile Agent technology. It makes use of SVM as a detecting tool because of its good classification performance when dealing with problems of high dimension nonlinear data with small sample set and high dimension non - linear data. Intellectuality and transferability of mobile Agent is utilized to move and detect intrusion among network nodes. A configuration of system model based on SVM and mobile Agent was presented, and some functional model design and system environment were introduced.
出处 《云南民族大学学报(自然科学版)》 CAS 2008年第1期68-71,共4页 Journal of Yunnan Minzu University:Natural Sciences Edition
基金 国家自然科学基金资助项目(60575045) 云南省自然科学基金资助项目(2005F0028Q) 云南省教育厅基金资助项目(5Y0588D 6Y0006D) 云南民族大学重点课程建设基金资助项目
关键词 入侵检测系统 支持向量机 移动AGENT AGLET intrusion detection system support vector machine mobile Agent Aglet
  • 相关文献

参考文献13

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2张义荣,肖顺平,鲜明,王国玉.基于机器学习的入侵检测技术概述[J].计算机工程与应用,2006,42(2):7-10. 被引量:15
  • 3谷雨,赵佳枢,张天军,徐宗本.基于免疫多样性的分布式入侵检测算法[J].西安交通大学学报,2006,40(10):1052-1055. 被引量:6
  • 4瓦普尼克.统计学习理论的本质[M].张学工,译.北京:清华大学出版社,2000.
  • 5谷雨,徐宗本,孙剑,郑锦辉.基于PCA与ICA特征提取的入侵检测集成分类系统[J].计算机研究与发展,2006,43(4):633-638. 被引量:25
  • 6SHAWE -TAYLOR J, CRISTANINI N. Kernel Methods for Pattern Analysis [ M ]. Cambridge University Press, 2004.
  • 7SUNG A H, MUKKAMALA S. Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks [ C ]. Paper Presented at the Symposium on Applications and the Internet (SAINT '03), 2003:27 -31.
  • 8张云通.移动Agent及其应用[M].北京:清华大学出版社,2002.
  • 9ASAKA M, OKAZAWA S, TAGUCHI A, et al. A Method of Tracing Intruders by Use of Mobile Agents [ C ]. INET'99 Conference, 1999.
  • 10..[ OL ].. http ://aglets. sourceforge. net,,..

二级参考文献68

  • 1张连华,张冠华,郁郎,张洁,白英彩.Intrusion detection using rough set classification[J].Journal of Zhejiang University Science,2004,5(9):1076-1086. 被引量:16
  • 2谷雨,郑锦辉,孙剑,徐宗本.基于独立成分分析和支持向量机的入侵检测方法[J].西安交通大学学报,2005,39(8):876-879. 被引量:7
  • 3谷雨,徐宗本,孙剑,郑锦辉.基于PCA与ICA特征提取的入侵检测集成分类系统[J].计算机研究与发展,2006,43(4):633-638. 被引量:25
  • 4LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 5LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 6KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 7LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 8An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 9ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 10The open source network intrusion detection system [EB/OL]. http://www.snort.org/.

共引文献290

同被引文献38

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部