期刊文献+

基于TCM-KNN算法的数据预处理问题研究 被引量:1

A Study on the TCM-KNN Algorithm Based Data Preprocessing Problem
下载PDF
导出
摘要 就基于数据预处理的入侵检测系统进行了研究,并针对数据预处理子系统,提出了一种有效的预处理方法,即将对数据源的基本处理和基于TCM-KNN算法的数据预处理聚类器相结合。实验证明,经过预处理的数据,不仅使不完整信息数量和攻击数据数量大大减少,而且使入侵检测系统的检测率得到了进一步的提高,误报率得到了进一步的降低。 This paper discussed the problem of data preprocessing of the invasion detection system. We investigated a data preprocessing based invation deteetion system in view of the problems of low check rate and high false alarm rate of the present system, and proposed an effective preprocessing approach to the data preprocessing subsystem, which integrated the basic processing for a data source and TCM-KNN algorithm based data preproeessing cluster. The experiment proves that the approach not only greatly decreases the imperfect information and attack data quantity, but also farther increases the detection rote and reduces the false alarm rate.
出处 《山东科学》 CAS 2009年第1期17-20,共4页 Shandong Science
基金 国家自然科学基金(90612003) 山东省科技攻关计划项目(2006GGB01101)
关键词 数据预处理 TCM-KNN算法 入侵检测 子系统 data preprocessing TCM-KNN algorithm instrusion detect sub-system
  • 相关文献

参考文献4

二级参考文献25

  • 1Hu X H,Cereone N. Learning in relational databases :A rough set approach.Intl. Journal of Computational Intelligence, 1995, 11(2):323-338.
  • 2Axelsson S. The base-rate fallacy and its implications for the difficulty of intrusion detection, In:Tsudik, Ged. Proc. of the 6^th Conf.on Computer and Communication Security. New York: ACM Press, 1999.1 -7.
  • 3Hsu C W,Lin C J . A comparison of methods for multiclass support vector machines. IEEE Trans. on Neural Networks, 2002,13(2) :415-425.
  • 4UCI Repository of Machine Learning Databases. http:// www.ics. uci. edu/-mlearn/MLR Repository. html.
  • 5王亚英.基于粗集理论的知识发现方法研究:[博士学位论文].上海:上海交通大学,2000.
  • 6Bykova M,Ostermann S,Tjaden B.Detecting network intrusions via a statistical analysis of network packet characteristics//Proceedings of the 33rd Southeastern Symposium on System Theory.Ohio,Athens,2001:309-314
  • 7Lee W,Stolfo S J.A framework for constructing features and models for intrusion detection systems.ACM Transactions on Information and System Security(TISSEC),2000,3(4):227-261
  • 8Barbarra D,Couto J,Jajodia S,Popyack L,Wu N.ADAM:Detecting intrusions by data mining//Proceedings of the 2001IEEE,Workshop on Information Assurance and Security.West Point,NY,USA,2001:11-16
  • 9Tamas A.IDDM:Intrusion detection using data mining techniques.Salisbury,Australia:DSTO Electronics and Surveillance Research Laboratory:Technical Report DSTO-GD-0286,2001
  • 10Luo J,Bridges S M.Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection.International Journal of Intelligent Systems,2000,15(8):687-704

共引文献48

同被引文献16

  • 1李洋,方滨兴,郭莉,陈友.基于直推式方法的网络异常检测方法[J].软件学报,2007,18(10):2595-2604. 被引量:26
  • 2LIU Wen-tao. Research on DoS attack and detection programming[C]//2009 3rd International symposium on Intelligent Information Technology Application. Nanchang, China: IEEE, 2009: 207-210.
  • 3HU Liang, BI Xiao-ming. Research of DDoS attack mechanism and its defense frame[C]//2011 3rd IEEE International Conference on Computer Reseach and Development. Shanghai, China: IEEE, 2011:440-442.
  • 4DIVAKARAN D M, MURTHY H A, GONSALVES T A. Detection of SY-N flooding attacks using linear prediction analysis[C]//Proceedings of 2006 IEEE International Conference on Networks. Singapore: Saira Kuttan Publication Chair, 2006: 218-224.
  • 5MUKKAMALA S, SUNG A H. Detecting denial of service attacks using support vector machines[C]//Proceedings of the 12th IEEE International Conference on Fuzzy Systems. Louis, Missouri, USA: IEEE, 2003: 1231-1236.
  • 6TSANG G C Y, CHAN P P K, YEUNG D S, et al. Denial of service detection by support vector machines and radial- basis function neural nework[C]//Proceedings of 2004 International Conference on Machine Learning and Cybernetics. Shanghai, China: IEEE, 2004: 4263-4268.
  • 7ABDELSAYED S, GLIMSHOLT D. An efficient filter for denial-of-service bandwidth attcks[C]//GLOBECOM'03, IEEE Global Telecommunications Conference. San Francisco, CA, USA: IEEE, 2003: 1353-1357.
  • 8ZHANG Zheng, MANIKOPOULOS C N. Detecting denial- of-service attacks through feature cross-correlation[C]//2004 IEEE/Samoff Symposium on Advances in Wired and Wireless Communication. Princeton, New Jersey: IEEE, 2004: 67-70.
  • 9FARAOUN K M, RABHI A. Data dimensionality reduction based on genetic selection of feature subsets[J]. INFOCOM-Joumal of Computer Science, 2007, 6(2): 9-19.
  • 10The LICI KDD Archive, Information and Computer Science, University of California, Irvine. KDD cup 1999 data[DB/OL]. [2011-11-19]. http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html.

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部