期刊文献+

一种基于融合孤立点挖掘的入侵检测技术 被引量:1

An Intrusion Detection Method Based on Outlier Detection
下载PDF
导出
摘要 将融合概念引入孤立点挖掘中,对基于相似度和的孤立点挖掘算法进行融合,提出一种基于投票机制的融合孤立点挖掘算法VoteSimiOut,并将其应用于入侵检测中。采用编码映射方法对符号型数据进行处理,并利用主成分分析来实现对编码映射后扩展的属性进行降维。详细阐述了具体实现方案,并通过仿真实验验证了该方法的可行性。 Brings the concept of ensemble into outlier detection, outlier mining algorithm of similar coefficient sum be ensembled. Proposes an anomaly detection method based on voting mechanism (VoteSimiOut) and applies it into intrusion detection. Transforms the character feature into numerical value by code mapping and uses Principal Components Analysis (PCA) to reduce dimeusion.
作者 黄斌 史亮
出处 《现代计算机》 2009年第1期27-30,共4页 Modern Computer
关键词 入侵检测 融合 孤立点 相似系数 编码映射 主成分分析 Intrusion Detection, fusion, Outlier, Similar Coefficient, Code Mapping, Principal Components Analysis
  • 相关文献

参考文献7

  • 1Han J, Kamber M. Data Mining: Concepts and Techniques [M]. San Fransisco, CA, USA: Morgan Kaufmann Publishers, 2000:381-389.
  • 2罗敏,王丽娜,张焕国.基于无监督聚类的入侵检测方法[J].电子学报,2003,31(11):1713-1716. 被引量:64
  • 3L.Portnoy, E.Eskin, S.Stolfo. Intrusion Detection with Unlabeled Data Using Clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA- 2001), Philadelphia, PA, 2001.
  • 4姜灵敏.基于相似系数和检测孤立点的聚类算法[J].计算机工程,2003,29(11):183-185. 被引量:19
  • 5Mukkamala S, Janoski G, Sung AH. Intrusion Detection using Support Vector Machines and Neural Networks. In: Proc. of the IEEE Int'l Joint Conf. on Neural Networks, 2002 : 1702-1707.
  • 6R.O.Duda,P.E.Hart,D.G. Stork Pattern Classification, China Machine Press,Beijing,2nd Edition,2004.
  • 7KDD99 Cup Dataset. http://kdd.ics.uci.edu/ databases/kd- dcup99/kddcup99.html. 1999 [DB/OL].

二级参考文献9

  • 1Han J, Kamber M. Data Mining: Concepts and Techniques. Copyright by Morgan Kaufmann Publishers, Inc.2001.
  • 2Barnett V, Lewis T. Outliers in Statistical Data. New York: John Wiley &Sons, 1994.
  • 3Knorr E, Ng R. A Unified Notion of Outliers : Properties and Computation. In proc. 1997 Int. Conf. Knowledge Discovery and Data Mining(KDD97), Newport Beach,CA, 1997-08:219-222.
  • 4Knorr E, Ng R. Algorithms for Mining Distance-based Outliers in Large Datasets.In Proc. 1998 Int. Conf. Very Large Data Base(VLDB98), New York, 1998-08:392-403.
  • 5Aming A, Agrawal R, Raghavan P. A Linear Method for Deviation Detection in Large Database. In Proc. 1996 Int. Conf. Data Mining and Knowledge Discovery(KDD96), Portland, OR, 1996-08:164-169.
  • 6HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 7蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 8迟国泰,郝君,徐琤,朱战宇.信贷风险评价指标权重的聚类分析[J].系统工程理论方法应用,2001,10(1):64-67. 被引量:36
  • 9刘海峰,卿斯汉,蒙杨,刘文清.一种基于审计的入侵检测模型及其实现机制[J].电子学报,2002,30(8):1167-1171. 被引量:15

共引文献79

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部