期刊文献+

基于Boosting算法的入侵检测

Intrusion detection based on boosting method
下载PDF
导出
摘要 提出了一种新颖的基于boosting BP神经网络的入侵检测方法。为了提高BP神经网络的泛化能力,采用改进的Boosting方法,进行网络集成。Boosting方法采用更有效的参数求解方法,即弱分类器的加权参数不但与错误率有关,还与其对正样本的识别能力有关。对"KDD Cup 1999 Data"网络连接数据集进行特征选择和归一化处理之后用于训练神经网络并仿真实验,得到了较高的检测率和较低的误报率,仿真结果表明,提出的入侵检测方法是有效的。 A novel method is proposed for intrusion detection based on improved boosting BP neural network.In order to improve the precision of the BP neural network for intrusion detection,the improved boosting algorithm is used to build an integration- neural network.The improved boosting adopts a new method to acquire parameters; the weighted parameters of weak classifiers are determined not only by the error rates,but also by their abilities to recognize the positive samples.Simulated experiments with KDD Cup 1999 network connections data which have been preprocessed with methods of features selection and normalization have shown that the proposed is effective for intrusion detection owing to excellent performance of the higher attack detection rate with lower false positive rate.
作者 况夯
机构地区 重庆教育学院
出处 《计算机工程与应用》 CSCD 北大核心 2008年第4期151-154,共4页 Computer Engineering and Applications
关键词 入侵检测 BOOSTING方法 BP神经网络 intrusion detection Boosting method BP neural network
  • 相关文献

参考文献7

  • 1马传香,李庆华,王卉.入侵检测研究综述[J].计算机工程,2005,31(3):4-6. 被引量:26
  • 2Bykova M,Ostermann S,Tjaden B.Detecting network intrusions via a statistical analysis of network packet characteristics[C].Proceedings of the 33rd Southeastern Symposium in System Theory,2001.
  • 3Jackson K,DuBois D,Stalling C,An expert system application for network,intrusion detection[C].Proceedings of the lgth National Computer Security Conference, 1991-10: 215-225.
  • 4Bonifacio J M.Neural networks applied in intrusion detection systems[C].Proc of the IEEE World Congress on Comp Intell(WCCI95 ), 1995.
  • 5Freund Y,Schapire R E.A decision-theoretic generalization of on-Line learning and an application to boosting[J].Journal of Computer and System Sciences, 1997,55( 1 ): 119-139.
  • 6KDD Cup 1999 Data[EB/OL].[1999].http://kdd.ics.uci.edu /databases/kddcup.html.
  • 7Wilson D R,Tony R M.lmproved heterogeneous distance functions[J]. Journal of Artificial Intelligence Research, 1997,6( 1 ) : 1-34.

二级参考文献10

  • 1Anderson J P. Computer Security Threat Monitoring and Survillance.Tech. Rep., James P Anderson Co., Fort Washington, PA, 1980
  • 2Denning D E. An Intrusion Detection Model. IEEE Trans. Software Eng., 1987, SE-13(2): 222-232
  • 3Denning D E, Neumann P G. Requirements and Model for IDES-A Real-time Intrusion Detection Expert System. Technical Report.,Computer Science Laboratory, SRI Intrusional, Menlo Park, CA, 1985
  • 4Anderson D, Frivold T, Valdes A. Next-generation Intrusion Detection Expert System (NIDES): A Summary. SRI-CSL-95-07, SRI International, Menlo Park, CA, 1995-05
  • 5Sinclair C, Pierce L, Matzner S. An Application of Machine Learning to Network Intrusion Detection. Proceedings of 15th Annual Computer Security Applications Conference, ACSAC99, 1999:371-377
  • 6Lee W, Stolfo S J, MokK W. A Data Mining Framework for Building Intrusion Detection Models. Proceedings of the IEEE Symposium on Security and Privacy, 1999:120-132
  • 7Me L. Security Audit Trail Analysis Using Genetic Algorithms. Proceedings of the 12dh International Conference on Computer Safety,Reliability and Security, Poznan, Poland, 1993-10:329-340
  • 8Crosbie M, Price K. Intrusion Detection Pages. COAST Laboratory,Purdue University, http://www.cerias.purdue.edu/coast/intrusiondetection/, 2001-02-17
  • 9Ye N, Li X. A Scalable Clustering Tecnique for Intrusion Signature Recognition. IEEE Systems Man and Cybernetics Information Assurance and Security Workshop. West Point, New York, 2001-06
  • 10李庆华.基于入侵检测的并行数据挖掘研究.武汉:华中科技大学计算机学院,2003

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部