期刊文献+

一种基于遗传聚类的报警聚合方法

Alert aggregation algorithm based on genetic clustering algorithm
下载PDF
导出
摘要 提出了一种基于遗传聚类算法对入侵检测系统(IDS)报警进行聚合的方法。将报警间属性的相异程度转换到值域区间[0.0,1.0]上,两报警间的相异程度用一个相异度矩阵表示;利用遗传算法的自适应优化特性选取较优的聚类中心,根据报警间的相异度矩阵将相似的报警进行聚类;在此基础上,分别对每一类中的报警采用凝聚层次的聚合方法进行聚合。实验结果证明,该方法能够有效地减少重复报警。 An alert aggregation algorithm was proposed, in which alerts of Intrusion Detection System (IDS) based on genetic clustering algorithm were aggregated. To convert the dissimilarity between two alert attributes into the value range of [0.0, 1.0], the dissimilarity of two alerts was represented by using a dissimilarity matrix; the more excellent clustering centers were chosen by the genetic algorithm, and the similar alerts would be clustered according to the dissimilarity matrix. Hierarchical aggregation method was adopted for every kind of alerts to aggregate according to the results of clustering. The experimental results show that the repeat alerts can be decreased effectively by this method.
出处 《计算机应用》 CSCD 北大核心 2008年第4期896-898,905,共4页 journal of Computer Applications
基金 国家973前期研究专项(2007CB316505) 国家973面上项目(2006CB303006) 江西师范大学博士基金项目
关键词 报警 聚合 相异度矩阵 遗传聚类算法 alert aggregation dissimilarity matrix genetic clustering algorithm
  • 相关文献

参考文献9

  • 1JULISCH K. Clustering intrusion detection alarms to support root cause analysis[J]. ACM Journal Name, 2002, 2(3): 111 -138.
  • 2DEBAR H, WESPI A. Aggregation and correlation of intrusion-detection alerts[ C]// Proceedings of 4th Intematlonal Symposium on Recent Advance in Intrusion Detection(RAID) 2001, LNCS 2212. Berlin: Springer-Verlag, 2001 : 85 - 103.
  • 3郭帆,余敏,叶继华.一种基于分类和相似度的报警聚合方法[J].计算机应用,2007,27(10):2446-2449. 被引量:11
  • 4Han J W Kamber M 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版杜,2001.147-158.
  • 5DAIN O, CUNNINGHAM R. Fusing a heterogeneous alert stream into scenarios[ C]// Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications. New York: ACM Press, 2001:1 -13.
  • 6傅景广,许刚,王裕国.基于遗传算法的聚类分析[J].计算机工程,2004,30(4):122-124. 被引量:49
  • 7穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 8MIT Lincoln Labs. 1999 DARPA intrusion detection evaluation[ EB/ OL]. [2007 - 03 - 15]. http://www. ll. mit. edu/IST/ideval/index. html.
  • 9ROESCH M. Snort user manual 2. 0. 0[ EB/OL] . [2006 -05 -23]. http://www.snort. org/docs/snort_htmanuals/htmanual_261/.

二级参考文献11

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3AnsariN HouE 李军 边肇祺译.用于最优化的计算智能[M].北京:清华大学出版社,1999..
  • 4VALDES A,SKINNER K.Probabilistic alert Correlation[C]// Proceedings of 4th International Symposium on Recent Advance in Intrusion Detection(RAID) 2001,Lecture Notes in Computer Science 2212.Berlin:Springer-Verlag,54-68.
  • 5DAIN O,CUNNINGHAM R.Fusing a heterogeneous alert stream into scenarios[C]// Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications.New York:ACM Press,2001:1-13.
  • 6DEBAR H,WESPI A.Aggregation and correlation of intrusion-detection alerts[C]// Proceedings of 4thInternational Symposium on Recent Advance in Intrusion Detection(RAID) 2001,Lecture Note in Computer Science 2212.Berlin:Springer-Verlag,85-103.
  • 7AUREL F,CUPPENS F.Using an intrusiondetection alert similarity operator to aggregate and fuse alerts[C/OL].[2007-04-01].http://www.rennes.enst-bretagne.fr/~fcuppens/articles/sar05.pdf.
  • 8DEBAR H.The intrusion detection message exchange format[EB/OL].[2006-03-16].http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-16.txt.
  • 9JULISCH K.Using root cause analysis to handle intrusion detection alarms[D].Phd Thesis,Unversisty of Dortmund,2003.
  • 10ROESCH M.Snort user manual2.0.0[EB/OL].[2006-05-23].http://www.snort.org/docs/snort_htmanuals/htmanual_261/.

共引文献235

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部