期刊文献+

基于粗糙集与小生境GA的网络入侵规则提取 被引量:2

Network intrusion rules extraction based on rough set and niche genetic algorithm
下载PDF
导出
摘要 对网络入侵规则的提取采用了一种基于ROUGH集和小生境GA结合的方法。该方法是利用粗糙集把原始数据进行处理,获得决策规则,并把这些决策规则作为小生境GA的初始种群,最后通过进化得到有较广覆盖范围和较高可信度的入侵检测规则集。 A method of network intrusion rules extraction based on rough set and niche genetic algorithm is proposed in this paper.This method deals with original data by rough sets for acquiring decisive rules and those can be chosen for the initial group of Niche Genetic Algorithm aimed at acquiring wider coverage range and higher reliability rules by revolution.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第5期110-112,119,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.60703097) 湖南省教育厅自然科学基金(No.05C245)~~
关键词 粗糙集 小生境 遗传算法 网络入侵 rough sets niche Genetic Algorithm(GA) network intrusion
  • 相关文献

参考文献5

  • 1Pwalak Z.Rough set-theoretical aspects of reasoning about data[M]. Boston,MA:Kluwer Academic Publisher, 1991.
  • 2蔡忠闽,管晓宏,邵萍,彭勤科,孙国基.基于粗糙集理论的入侵检测新方法[J].计算机学报,2003,26(3):361-366. 被引量:57
  • 3Shon T,Seo J,Moon J.SVM approach with a genetic algorithm for network intrusion detection[C]//Proc of the 20th Int'l Symp.on Computer and Information Sciences (ISCIS 2005 ).Berlin: Springer-Verlag, 2005 : 224-233.
  • 4Keband D,Goldbegr D E.An investigation of niche and species formation in genetic fuction optimization[C]//Proceedings of the Third International Conference on Genetic Algorlthm.CA:Morgan Kufmann, 1989.
  • 5Cannady J.Artificial neural networks for misuse detection[C]//Proc of the'98 National Information System Security Conf. (NISSC'98). Arlington:Virginia Press, 1998:443-456.

二级参考文献8

  • 1Bace R. Intrusion Detection. New York: Macmillan Technical Publishing, 2000
  • 2Forrest S, Hofmeyr S A et al. A sense of self for Unix processes. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996. 120~128
  • 3Cohen W W. Fast effective rule induction. In: Proceedings of the 12th International Conference, Lake Taho, California, 1995. 115~123
  • 4Lee W, Stolfo S, Chan P. Learning patterns from Unix process execution traces for intrusion detection. In:Proceedings of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, 1997. 191~197
  • 5Wespi A, Dacier M et al. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), Toulouse, France, 2000. 110~129
  • 6Asaka M, Onabuta T, Inoue T, Okazawa S, Goto S. A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems,2001, E84D (5): 570~577
  • 7Pawlak Z . Rough Sets-Theoretical Aspect of Reasoning about Data. Dordrecht: Kluwer Academic Publishers, 1991
  • 8Vinterbo S,hrn A. Minimal approximate hitting sets and rule templates. International Journal of Approximate Reasoning, 2000, 25(2):123~143

共引文献56

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部