期刊文献+

基于混合互信息的决策树入侵检测 被引量:1

Intrusion detection based on decision tree with mutual information
下载PDF
导出
摘要 为了提高入侵检测的准确度和速度,针对入侵规则属性相关性的特点,将属性与类间的互信息与属性间的互信息结合,提出了一种新的混合互信息的决策树分类算法。在对此算法进行了算法设计和分析的基础上,将由此算法构造的决策树分类方法对入侵规则进行组织,改变了传统的入侵规则逐条串行检测,以增加预处理时间为代价,提高了数据包的过滤速度和准确度。实验分析表明,应用该算法的入侵检测系统比使用传统方法具有更高的准确率和速度。 Traditional intrusion detection systems(IDS) not only have high rate of false positive and false negative with the increasing complexity of intrusion, but also lack effectiveness for very large test data because of its simple structure. Therefore, based on relationship of the attributes of intrusion rules, this paper presents a new classification algorithm in order to improve speed and accuracy of intrusion detection, which selects a node's attribute with more information gain, but with less mutual information between the attributes of the node and that of all the upper nodes. This method avoids selecting the redundant attributes and achieves the reduction in entropy. After the algorithm is designed and analyzed, Apply it into the rules to form a decision tree, which changes the conventional way of searching the packet orderly, and improves the matching speed at the cost of preprocess time. The result of an experiment shows that the intrusion detection system using the proposed algorithm works more efficiency than using conventional method or ID3 decision tree.
出处 《辽宁工程技术大学学报(自然科学版)》 CAS 北大核心 2009年第2期273-276,共4页 Journal of Liaoning Technical University (Natural Science)
基金 国家自然科学基金资助项目(70572099) 辽宁省自然科学基金资助项目(1050349)
关键词 互信息 决策树 规则 入侵检测 mutual information decision tree rules intrusion detection
  • 相关文献

参考文献9

  • 1杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 2衣治安,尹淑欣,王惠媛.入侵检测系统中模式匹配算法探讨[J].辽宁工程技术大学学报(自然科学版),2004,23(6):816-819. 被引量:5
  • 3Kruegel C,Toth T, Using Decision Trees to Improve Signature-based Intrusion Detection[C]//RAID, 2003:173-191.
  • 4Hongyu Yang, Lixia Xie, Jizhou Sun.An Application of Decision Support to Network Intrusion Detection[C]//IEEE 2004,Candian Conference on Electrical and Computer Engineering, Canada: 2004:1703-1706.
  • 5Shannon C E. A mathematical theory of communication[J].Bell System Technical Journal, 1948,27(3): 379-429, 623-656.
  • 6Quinlan J R. Induction of Decision Trees[J].Maehine Learning, 1986,1(1):81-106.
  • 7Quinlan J R. Decision trees as probabilistic classifiers[C]//In Proceedings of the Fourth International Workshop on Machine Learning. Morgan Kaufmann,1987: 31-37.
  • 8Wang Xizhao, Xie Jingbo. An Extended Fuzzy2ID3 Based on the Mutual Information between Attributes[J]. Fudan Journal, 2004, 43(5):777-780.
  • 9MIT Lincoln Labs. DARPA Intrusion Detection Evaluation[DB/OL] .http://www.ll.mit.edu/IST/ideval, 1999.

二级参考文献26

  • 1Boyer R S, Moore J S. A fast string searching algorithn[J].Comm ACM,1977,20 (10):762-772.
  • 2Exact String Matching Algorithms. http: //www-igm.univ-mlv.fr / ~ lecroq/string/index.html.
  • 3Aho A, Corasick M.Efficient string matching. an aid to biliographic search[J].Comm ACM, 1975,(18):33-40.
  • 4Coit C J, Staniford S,McAlerney J.Towards faster patern matching for intrusion detection or exceeding the speed of snort[C].In:DARPA Information Survivability Conference and Exposition,2001.
  • 5Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 6Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 7Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 8Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
  • 9Anderson J P.Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co, 1980.
  • 10Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.

共引文献48

同被引文献13

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部