期刊文献+

基于CVM的入侵检测 被引量:2

Intrusion Detection System using Core Vector Machine
下载PDF
导出
摘要 本文提出了基于CVM算法的入侵检测方法,这种方法先对样本集求其MEB问题,MEB问题的解就是决定分类超平面的支持矢量,然后再根据支持矢量的分布对网络的入侵行为进行分类。通过用KDD99数据的验证,证明了这种方法的有效性和可行性。 Intrusion Detection System based on core vector machine is presented in this paper. Firstly ,the minimum enclosing ball of a training data set is solved by MEB (Minimum Enclosing Ball) algorithm, then the optimal separating hyperplane is constructed by the solutions of the core sets. According to the distribution of the core sets, the different intrusion actions can be detected. The related experiment indicates that the algorithm is feasible and effective.
出处 《微计算机信息》 北大核心 2008年第18期45-46,24,共3页 Control & Automation
关键词 核心矢量机 核心集 入侵检测 Core Vector Machine Core sets Intrusion Detection System
  • 相关文献

参考文献7

  • 1李冬梅,王杰.神经网络在入侵检测系统中的应用[J].微计算机信息,2005,21(10X):29-31. 被引量:13
  • 2田俊峰,赵卫东,杜瑞忠,蔡红云.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115-120. 被引量:15
  • 3陆正伟,钱江.一种应用免疫原理的入侵检测原型系统[J].微计算机信息,2006,22(07X):97-99. 被引量:8
  • 4lvor W .Tsang, James T. Kowk, Pak-Ming Cheung. Very Large SVM Training using Core Vector Machine.Fast SVM Training on Very Large Data Sets[J].Journal of Machine Learning Research,2005,6:365-392.
  • 5Friedman J. Another Approach to Polychotomous Classification [R].Department of Statistics of Stanford University. http: //www- stat.stanford.edu/reports/friedman, 1996-06.
  • 6Weston J, Watkins C. Multi-class Support Vector Machines[R]. Royal Holloway, Department of Computer Science: University of London, 1998-10.
  • 7KDD99.KDD99 Cup Dataset[Z]. http: //kdd.ics.uci.edu/databas- es/kddcup99/kddcup99.html, 1999.

二级参考文献17

  • 1高光勇,迟乐军,王艳春.联动防火墙的主机入侵检测系统的研究[J].微计算机信息,2005,21(07X):66-68. 被引量:23
  • 2胡守仁.神经网络导论[M].北京:国防科大出版社,1995.113.
  • 3Lunt T.A survey of intrusion detection techniques. Computers and Security, 1993,12:405-418.
  • 4Jeremy Frank. Artificial Intelligence and Intrusion Detection. Current and Future Directions, University of California at Davis, June 1994.
  • 5Kohonen T. Learning Vector Quantization. Neural Networks, 1988, 1(1).
  • 6CUPPEN F.Managing alerts in a multi-intrusion detection environment[A].Proceedings of the 17th Annual Computer Security Applications Conference[C].2001.22-32.
  • 7BASS T.Intrusion detection systems and multisensor data fusion[J].Communications of the ACM,2000,43(4):99-105.
  • 8BASS T,ROAD S.Multisensor data fusion for next generation distributed intrusion detection systems[A].IRIS National Symposium Draft[C].1999.24-27.
  • 9VAIDES A,SKINNER K.Probabilistic alert correlation[A].Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection[C].2001.54-68.
  • 10BURROGHS D J,WILSON L F,CYBENKO G V.Analysis of distributed intrusion detection systems using bayesian methods[A].Proceedings of IEEE International Performance Computing and Communication Conference[C].2002.239-334.

共引文献33

同被引文献31

  • 1李红莲,王春花,袁保宗,朱占辉.针对大规模训练集的支持向量机的学习策略[J].计算机学报,2004,27(5):715-719. 被引量:53
  • 2苏金树,张博锋,徐昕.基于机器学习的文本分类技术研究进展[J].软件学报,2006,17(9):1848-1859. 被引量:383
  • 3周志华,王钰.机器学习及其应用[M].北京:清华大学出版社,2006.
  • 4CristianiniN Shawe-TaylorJ 李国正译.支持向量机导论[M].北京:电子工业出版社,2004..
  • 5Mulay S,Devale P,Garje G. Decision tree based support vector machine for intrusion detection[A].Piscataway,NJ:IEEE,2010.59-63.
  • 6Scholkopf B,Burges C,Vapnik V. Incorporating invariances in support vector learning machines[A].Beilin:Springer-Verlag,1996.47-52.
  • 7Camps V G,Mooij J,Scholkopf B. Remote sensing feature selection by kernel dependence measures[A].Piscataway,NJ:IEEE,2010.587-591.
  • 8Kim S,Son J,Kong M. Korean text chunk identification using support vector machines[A].Piscataway,NJ:IEEE,2006.674-679.
  • 9Wei Yuan,Zhang Lingyu,Zhang Yaxuan. Combining support vector machines, border revised rules and transformation based error-driven learning for Chinese chunking[A].Piscataway,NJ:IEEE,2010.383-387.
  • 10Che Hongkun,Xiang Zhanqin,Cheng Yaodong. Features extraction based on wavelet entropy of decomposed signals and flaws identification with support vector machine in ultrasonic inspection[A].Piscataway,NJ:IEEE,2006.10215-10219.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部