期刊文献+

基于模糊决策树的入侵检测规则生成技术

Technology of Producing Intrusion Rules Based of Fuzzy Decision Tree
下载PDF
导出
摘要 针对计算机免疫系统模型GECISM中的类MC Agent,利用模糊决策树Fuzzy-Id3算法并使用应用程序中的系统调用作为数据集构造决策树,从而生成计算机免疫系统中的入侵检测规则,并与C4.5算法生成规则进行了对比分析,利用Fuzzy-Id3算法方法生成的规则对未知数据集进行分类有较低的误报率和漏报率. On the base of MC Agent which kind of General computer Immune System Model, this paper make use of fuzzy decision tree Fuzzy-Id3 algorithm to construct fuzzy decision tree, which the data set uses in the system call of the application procedure. Thus in the production intrusion detection rules of computer immune system, and has carried on the contrastive analysis with the CA. 5 algorithm generative rule, carries on the classification using the Fuzzy-Id3 algorithmic method production's rule to the unknown data set to have the low rate of false and the rate of missing report.
出处 《河北大学学报(自然科学版)》 CAS 北大核心 2008年第4期438-442,共5页 Journal of Hebei University(Natural Science Edition)
关键词 入侵检测 计算机免疫系统 系统调用 Fuzzy-Id3算法 规则 intrusion detection computer immune system system call Fuzzy-ID3 rules
  • 相关文献

参考文献7

  • 1王凤先,常胜,刘振鹏,等.一种仿生免疫的计算机安全系统模型[Z].全国开放式分布与并行计算学术会议,武汉,2002.
  • 2SOMAYAJ I A, HOFMEYR S A, FORREST S. Principles of Computer Immune System[ Z]. New Security Paradigms workshop, ACM, Charlottesville, Virginia, 1998.
  • 3王凤先,张岩,刘振鹏,王静红.基于系统调用的入侵检测规则的生成[J].计算机工程与应用,2005,41(3):75-76. 被引量:4
  • 4QUINLAN JR. Induction of decision trees[J]. Mach Learning, 1986,1 (1) :81 - 106.
  • 5LEE W, STOLFO S J, CHAN P K. Learning Patterns from Unix Process E xecfution Traces for Intrusion Detection[Z]. The Fourteenth National Conference on Arcificial Intelligence(AAAI-97), Provideme, Rhode Island, 1997.
  • 6王熙照,孙娟,杨宏伟,赵明华.模糊决策树算法与清晰决策树算法的比较研究[J].计算机工程与应用,2003,39(21):72-75. 被引量:21
  • 7SOMAYAHI A, FORREST S. Automated response using system-call delays[ Z]. The 9th USENIX Security Symposium, Denver, Colorado, 2000.

二级参考文献15

  • 1Quinlan J R.Induction of Decision Trees[J].Machine Learning, 1986; (1):81~106.
  • 2Y Yuan,M J Shaw.Induction of fuzzy decision trees[J].Fuzzy Sets Syst, 1995 ;69(2) : 125-139.
  • 3.Tom M Mitchell.MACHINE LEARNING[M].International Edition,1997.
  • 4Bingchiang Jeng,Jeng Yung Mo,Liang Ting Peng.FILM :a fuzzy inductive learning method for automated knowledge acquisition[J].Decision Support Systems,1997;21:61-73.
  • 5Wang Xi zhao,Chen Bin,Qian Guo liang et al.On the Optimization of Fuzzy Decision Trees[J].Fuzzy Sets and Systems,2000; 112:117~ 125.
  • 6Somayaji A,Hofmeyr SA,Forrest S.Principles of a Computer Immune System[C].In:New Security Paradiagms Workshop,ACM,1998.
  • 7Forrest S,Hofmeyr SA,Somayaji A. Computer immunology[J].Communications of the ACM, 1997.
  • 8Forrest S,Hofmeyr SA,Somayaji A et al.A sense of self for UNIX processes[C].In:Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy,IEEE Press,1996.
  • 9Hofmeyr SA,Forrest S,Somayaji A.Intrusion Detection using Sequences of System Calls[J].Journal of Computer Security, 1998; 6:151~180.
  • 10Somayaji A,Forrest S.Automated Response Using System-Call Delays[C].In:Proceedings of the 9th USENIX Security Symposium,2000?A.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部