期刊文献+

一种新的半监督入侵检测算法 被引量:7

Novel intrusion detection algorithm based on semi-supervised clustering
下载PDF
导出
摘要 针对无监督学习的入侵检测算法准确度不高、监督学习的入侵检测算法训练样本难以获取的问题,提出了一种粒子群改进的K均值半监督入侵检测算法,利用少量的标记数据生成正确样本模型来指导大量的未标记数据聚类,对聚类后仍未能标记的数据采用粒群优化的K均值聚类,有效提高分类器的分类准确性,并实现了对新类型攻击的检测。实验结果表明,算法的整体检测效果明显优于基于无监督学习和监督学习的检测算法。 An anomaly intrusion detection algorithm based on semi-supervised clustering along with PSO K-means was presented. It could solve the problems of the low detection rate of the intrusion detection algorithms based on unsupervised learning, and the insufficiency of training samples of the intrusion detection algorithms based on supervised learning. The algorithm utilized minimal labeled data and lots of unlabeled data to improve its learning capability, and novelty detection could also be carried out. The experimental results manifest that the detection results of the algorithm outperforms both the one based on unsupervised learning remarkably and the one based on supervised learning.
出处 《计算机应用》 CSCD 北大核心 2008年第7期1781-1783,共3页 journal of Computer Applications
基金 湖南省自然科学基金资助项目(06JJ5106) 湖南省教育厅科学研究项目(06C841) 湘潭大学研究生创新基金资助项目
关键词 半监督聚类 入侵检测 粒群优化 K均值 semi-supervised clustering intrusion detection particle swarm optimization K-means
  • 相关文献

参考文献8

  • 1WESTON J . WATKINS C . Multi - class support vector machines [ R]. Royal Holloway, Department of Computer Science: University of London, 1998.
  • 2FLANAGAN J A. Unsupervised clustering of symbol strings[ C] // International Joint Conference on Neural Networks, IJCNN' 03. Portland Oregon, USA: [ s. n. ], 2003:3250 - 3255.
  • 3BASU S, BANERIEE A, MOONEY R. Semi-supervised clustering by seeding[ C]// Proceedings of the 19th International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann Publishers, 2002:19 - 26.
  • 4KENNEDY J, EBERHART R C. Particle swarm optimization [ C]// Proceedings of IEEE International Conference on Neural Networks. Perth Australia: [ S. l]: IEEE Press. 1995:1942 - 1948.
  • 5SCLIM S Z, LSMAILM A. K-means-type algorithm: A generalized convergence theorem and characterization of local optima reality [ J]. IEEE Transaction Pattern Analysis and Machine Intelligence, 1984, PAMI-6( 1 ) : 81 - 87.
  • 6The UCI KDD Archive. KDD99 cup dataset [ EB/OL]. [2007 -10 - 10]. http://kdd, ics. uci. edu/databases/kddcup99 /kddcup99. html.
  • 7俞研,黄皓.一种半聚类的异常入侵检测算法[J].计算机应用,2006,26(7):1640-1642. 被引量:17
  • 8LEE W, STOLFO S, MOK K. A data mining framework for building intrusion detection models [ C]// Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 1999:120 - 132.

二级参考文献5

  • 1DENNING DE. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987, SE-13:222 -232.
  • 2PORTNOY L, ESKIN E, STOLFO S. Intrusion detection with unlabeled data using clustering[A]. Proceedings of ACM CSS Workshop on Data Mining Applied to Security[ C].2001.
  • 3BASU S, BANERJEE A, MOONEY R. Semi-supervised clustering by seeding[ A]. Proceedings of the 19th International Conference on Machine Learning[ C]. 2002. 19 -26.
  • 4The UCI KDD Archive. KDD99 cup dataset[ EB/OL]. http://kdd.ics. uci. edu/databases/kddcup99/kddcup99.html, 1999.
  • 5LEE W, STOLFO S, MOK K.A data mining framework for building intrusion detection models[ A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[ C].1999.

共引文献16

同被引文献57

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部