期刊文献+

基于PSO模糊聚类算法的入侵检测研究

Research intrusion detection based on PSO fuzzy clustering algorithm
下载PDF
导出
摘要 提出一种将粒子群优化(PSO)和FCM相结合的聚类算法PSOFCA对入侵检测系统进行研究,克服FCM方法自身对初始值敏感、容易陷入局部最优等问题。最后对实验数据进行仿真实验,并将实验结果与其他算法结果相比较,结果表明PSOFCA算法在入侵检测中能获得较好的检测能力。 A Particle Swarm Optimization-based Fuzzy Clustering Algorithms (PSOFCA) is proposed to improve some defects of sensitivity to the initial data,getting in the local optimization and so on about Fuzzy C-Means in intrusion detection system.Finally,the empirical datum is simulated,and the computational results compares with other algorithm results.The compared results show a better detective ability than other algorithms by the data obtained in experiment.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第2期149-151,共3页 Computer Engineering and Applications
基金 国家高技术研究发展计划( 863)( the National High-Tech Research and Development Plan of China under Grant No.2006AA04Z131) 。
关键词 入侵检测 模糊均值算法 粒子群优化算法 intrusion detection FCM PSO
  • 相关文献

参考文献7

  • 1丁宏,赵观军.一种快速网络入侵检测的关联规则挖掘算法[J].计算机工程与应用,2006,42(11):153-156. 被引量:7
  • 2Aanderson J P.Computer security threat monitoring and surveillance[R].James P.Anderson Company,Fort Washington,Pennsylvania,1980.
  • 3Lunt T F,Tamaru A,Gilham F.A real time intrusion detection expert system(IDES)[R].Computer Science Laboratory,SRI International,Menlo Park,California,1992.
  • 4季赛,袁慎芳,郑关胜,田伟.基于粗糙集和系统调用的入侵检测研究[J].计算机工程与应用,2007,43(14):120-123. 被引量:3
  • 5Ghosh A,Schwarzbard A.A study in using neural networks for anomaly and misuse detection[C]//The 8th USEN Ⅸ Security Symposium,Washington DC,1999.
  • 6Bezdek J C.Pattern recognition with fuzzy objective function algorithms[M].New York:Plenum Press,1981.
  • 7Kennedy Y J,Eberhart R.Particle swarm optimization[C]//Proceedings of IEEE International Conference on Neural Networks.Piscataway,NJ:IEEE,1995:1942-1948.

二级参考文献7

  • 1R Heady,G Luger,A Maccabe et al.The architecture of a network level intrusion detection system.Computer Science Department,University of New Mexico,1990-08
  • 2Agrawal R,Imielinski T,Swami A.Mining association rules between sets of items in large databases.SIGMOD-1993,1993:207~216
  • 3Wenke Lee,Salvatore J Stolfo.Data Mining Approaches for Intrusion Detection[C].In:Proceedings of the 7th USENIX Security Symposium San Antonio,Texas,1998-01:79~94
  • 4Jianxiong Luo.Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection[J].International Journal of Intelligent Systems,2000, 15 (1)
  • 5Bing Liu,Wynne Hsu,Yiming Ma.Mining Association Rules with Multiple Minimum Supports[C].In:ACM SIGKDD International Conference on Knowledge Discovery & Data Mining(KDD-99),San Diego,CA,USA,1999-08
  • 6K Wang,J Han.Mining frequent itemsets using support constraints[C].In:Proceedings of the 26th 374 International Conference on Very Large Data Bases,2000:43~52
  • 7苏健,高济.Meta-information generation in distributed information system[J].Journal of Zhejiang University Science,2002,3(5):532-537. 被引量:3

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部