期刊文献+

基于区间值2型模糊集的伪装入侵检测算法 被引量:6

Masquerade Intrusion Detection Algorithm Based on Interval Type-2 Fuzzy Set
下载PDF
导出
摘要 由于正常用户的行为本身是变化的,且伪装用户的行为可能看起来是正常的,这种不确定性使得现有的伪装检测算法很难正确判断用户身份的真实性,从而限制了现有算法的实际应用推广.本文合理地选择用户的行为特征,并建立相应的用户可信度计算方法,采用区间值模糊集对多个特征进行可信度综合计算得到用户的最终可信度,将该值与设定的阈值比较从而判断用户是否属于伪装.理论分析及实验结果显示,与普通模糊计算相比,区间值模糊计算能有效表示及处理伪装检测中的不确定性,因而能得到比较理想的检测效果. User activities are normally in variant forms or may be aberrant in some cases. This kind of uncertainty leads to the difficulty for current intrusion detection algorithm in deciding whether the user is masquerading or not. In the proposed algorithm, the user features are properly selected and the corresponding user trustworthiness computation methods are introduced. Different types of trustworthiness are integrated with interval type-2 fuzzy set,thus user trustworthiness is got and applied to a thresholdbased decision. Theory analysis and experiments show that the proposed algorithm can handle the uncertainties that exist in user actirity or user model, so better detection performance can be achieved, compared with the detection algorithm based on ordinal fuzzy set.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第4期777-780,共4页 Acta Electronica Sinica
基金 国家人事部留学人员创业基金 福建省自然科学基金(No.A0410007)
关键词 伪装检测 区间值模糊集 不确定性 可信度 masquerade detection interval type-2 fuzzy set uncertainty trustworthiness
  • 相关文献

参考文献15

  • 1Liang Qi-lian,Mendel J M.interval type-2 fuzzy logic systems:theory and design[J].IEEE Transactions on fuzzy systems,2000,8(5):535-550.
  • 2谭小彬,王卫平,奚宏生,殷保群.基于隐马尔可夫模型的异常检测[J].小型微型计算机系统,2004,25(8):1546-1549. 被引量:9
  • 3Mendel J M,John R I B.Type-2 fuzzy sets made simple[J].Transactions on Fuzzy Systems,2002,10(2):117-127.
  • 4Wang Ke,Salvatore J S.One-class training for masquerade detection[OL].In Proc.3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security[C].http://www1.cs.columbia.edu/ids/publications/DMSEC-camera.PDF,2003.
  • 5Mizuki Oka,Yoshihiro Oyama,Hirotake Abe,Kazuhiko Kato.Anomaly detection using layered networks based on eigen cooccurrence matrix[A].LNCS 3224(Recent Advances in Intrusion Detection)[C].Springer,2004.223-237.
  • 6Warrender C,Forest S,Pearlmutter,B.Detecting intrudions using system calls:altemative data models[A].In Proc.Symposium on Secuiity and Privacy[C].Oakland California:IEEE.Computer Society Press,1999.133-145.
  • 7闫巧,谢维信,宋歌,喻建平.基于HMM的系统调用异常检测[J].电子学报,2003,31(10):1486-1490. 被引量:15
  • 8Schonlau M,DuMouchel W,Ju W-H,Karr A F,Theus M,Vardi Y.Computer intrusion:detecting masquerades[J].Statistical Science,2001,16(1):58-74.
  • 9Maxion R A,Townsend T N.Masquerade detection augmented with error analysis[J].IEEE Transactions on Reliability,2004,53(1):124-147.
  • 10Oickerson J E,Dickerson J A.Fuzzy network profiling for intrusion detection[A].In Proc 19th International Conference of the North American Fuzzy Information Processing Society[C].USA:IEEE Computer Society Press,2000.301-306.

二级参考文献18

  • 1Stephanie Forrest, Steven, A. Hofmeyr, Anti Somayaji. A Seace of Self for Unix Processes[A] .IEEE Symposium on Security and Privacy[C].Oakland, California IEEE Computer Society, 1996. 120 - 128.
  • 2Christina Warrender, Stephanie Forrest, Barak Pearlmutt. Detecting Intrusions Using System Calls: Alternative Data Model[ A]. 1999 IEEE Symposium on Security and Privacy[C]. 1999.133 - 145.
  • 3R Dugad, U B Desai. A Tutorial on Hidden Markov Models [ OL] url.http://vision. ai. uiuc. edu/dugad/guestbook/addHMMguest, html.
  • 4Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras. State transition analysis: a rule-based intrusion detection approach[J]. IEEE Trans. on Software Engineering, March 1995,21 (3) : 181 - 199.
  • 5Teresa F lunt,R Jagannnthan, Menlo Park. A Prototype Real-Time Intrusion-Detection Expert System[A]. 1988 IEEE Symposium on Security and Privacy[C]. 1988.59 - 65.
  • 6Yanqiao. Xie Weixin. Yangbin Songge. An anomaly intrusion detection method based on HMM[J]. Eletronics Leeters,2002, 38(13) :663 -664.
  • 7Wenke Lee Dong Xiong. Information-Theoretic Measures for Anomaly Detection[A]. Proceedings IEEE Symposium on Security and Privacy[ C]. IEEE Computer Society, Oakland, California, USA. May 14 - 16,2001.
  • 8Anderson J P. Computer security threat monitoring[R]. Technical Report, TR80904, Washington: Anderson Co. , 1980.
  • 9Denning D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering. 1987,13(2): 222-232.
  • 10Ye N. A markov chain model of temporal behavior for anomal detection [C]. In:Proceedings of the 2000 IEEE Systems, Man,and Cybernetics Information Assurance and Security Workshop,2000.

共引文献22

同被引文献61

  • 1虞强源,刘大有,欧阳继红.基于区间值模糊集的模糊区域拓扑关系模型[J].电子学报,2005,33(1):186-189. 被引量:13
  • 2杨万才,殷明娥.几种L-模糊集之间的关系[J].辽宁师范大学学报(自然科学版),2005,28(2):143-145. 被引量:4
  • 3Smaha S E. Haystack: An intrusion detection system[ A]. Proceedings of the IEEE forth Aerospace Computer Security Appli- cations Conference[ C ]. Austin, Texas: Tracor Applied Science Inc, 1988.37 - 44.
  • 4Wu H C, Huang S H S. User behavior analysis in masquerade detection using principal component analysis [A ]. Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications[ C]. Washington DC, USA: IEEE Computer Society, 2008. 201 - 206.
  • 5Shim C Y, Kim J Y, Gantenbein R E. Practical user identification for masquerade detection[ A ]. Advances in Electrical and Electronics Engineering-IAENG Special Edition of the World Congress on Engineering and Computer Science 2008[ C 1. San Francisco, California, USA: IEEE Press, 2008.47 - 51.
  • 6Tian X G,Gao L Z,Sun C L, et al.A method for anomaly detection of user behaviors based on machine learning [ J ]. The Journal of China Universities of Post and Telecommunications, 2006,13(2) :61 - 65,78.
  • 7Dash S K, Reddy K S, Pujari A K. Adaptive Naive Bayes method for masquerade detection[J].Security and Communication Networks,2010, DOI: 10. 1002/sec. 168.
  • 8CouU S E,Branch J W,Szymanski B K, et al. Sequence alignment for masquerade detection [J].Computational Statistics & Data Analysis,2008,52(8) :4116 - 4131.
  • 9Maxion R A, Townsend T N. Masquerade detection using truncated command lines[A]. Proceedings of the International Conference on Dependable Systems and Networks [ C ]. Los Alamitos, California: IEEE Computer Society, 2002. 219 - 228.
  • 10Lane T.Machine Learning Techniques for The Computer Security Domain of Anomaly Detection [ D ]. West Lafayette: Purdue University,2000.

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部