期刊文献+

构造稀疏最小二乘支持向量机的网络入侵检测模型 被引量:1

Construct Sparse Least Squares Support Vector Machine for Network Intrusion Detection
下载PDF
导出
摘要 从最小二乘支持向量机的稀疏表达出发,构建高效的基于稀疏最小二乘支持向量机的网络入侵检测模型,提出了一种通过基于核空间近似策略的有效低秩逼近来有效减小原始训练样本集中的支持向量数来实现最终模型的稀疏表达。以MIT KDD99数据集为基础,对所提出方法进行有效性验证,并与利用剪枝策略通过递归过程中不断减少模型中支持向量个数的稀疏化方法、基本最小二乘支持向量机以及标准支持向量机方法的性能进行对比。结果表明:基于核空间近似的最小二乘支持向量机稀疏化与标准最小二乘支持向量机相当;此外稀疏最小二乘支持向量机能够提高入侵检测响应速度。 From the viewpoint of sparseness representation building of least squares support vetor machine(LSSVM), a novel sparse LS-SVM is presented for the modeling of network intrusion detection. The proposed sparse LS-SVM may be constructed via two methods, i. e. , the iteration elimination according to the sorted value of model coefficients; the kernel space approximation method to construct the low rank subset approximation of training dataset that is applied for the training of LS-SVM to achieve sparse- ness and to improve the intrusion detection response speed. The proposed sparse LS-SVM is illustrated via MIT KDD 99 dataset and the results show that a better performance can be achieved in comparsion to LSSVM.
出处 《华东理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第6期876-881,共6页 Journal of East China University of Science and Technology
基金 国家自然科学基金项目(60543005,60674089) 教育部高校博士点基金项目(20040251010) 上海市重点学科建设项目(B504) 广西青年科学基金项目(桂科青0728091)
关键词 最小二乘 支持向量机 稀疏性 入侵检测 低秩逼近 least squares support vector machine sparseness intrusion detection low rank approxima
  • 相关文献

参考文献14

  • 1Bernhard Pfahringer. Winning the KDD99 classification cup: Bagged boosting [J]. ACM SIGKDD, Explorations News Letter, 2000, 1(2): 65-66.
  • 2Itzhak Levin. KDD99 classifier learning contest LLSoft result overview [J]. ACM SIGKDD, Explorations News Letter, 2000, 1(2): 67-75.
  • 3Miheev Vladimir, Vopilov Alexei, Shabalin Ivan. The MP13 approach to the KDD99 classifier learning contest [J]. ACM SIGKDD, Explorations News Letter, 2000, 1(2): 76-77.
  • 4Yang Xiang-Rong, Shen Jun-Yi, Wang Rui. Artificial immune theory based network intrusion detection system and the algorithms design [A]. Proceedings of 2002 International Conference on Machine Learning and Cybernetics[C]. New Jersey: IEEE Press, 2002. 73-77.
  • 5Botha Martin, von Solms Rossouw. Utilizing fuzzy logic and trend analysis for effective intrusion detection[J]. Computers and Security, 2003, 22(5):423-434.
  • 6Wang Yong, Yang Huihua, Wang Xingyu, et al. Distributed intrusion detection system based on data fusion method [A]. The 5th World Congress on Intelligent Control and Automation[C]. New Jersey: IEEE Press, 2004. 4331-4334.
  • 7Andrew H Sung. Identify important features for intrusion detection using support vector machines and neural networks [A]. IEEE Proceedings of the 2003 Symposium on Application and the Internet[C]. New Jersey: IEEE Press, 2003. 209-217.
  • 8Vapnik V N. The Nature of Statistical Learning Theory [M]. New York: Springer, 1995.
  • 9Nello cristianini, John Shawe-Taylor. An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods [M]. Cambridge: Cambridge University Press, 2000.
  • 10Dong Seong Kim, Jong Sou Park. Network-based intrusion detection with support vector machines [A]. ICOIN 2003 [C]. New York: Springer, 2003. 747-756.

同被引文献2

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部