期刊文献+

基于无监督聚类算法的入侵检测 被引量:8

Intrusion Detection Based on Unsupervised Clustering Algorithm
下载PDF
导出
摘要 针对应用聚类方法检测入侵中参数人为指定的问题,提出了一种新的基于无监督的聚类算法。该方法不需要人为设置参数并且不受数据输入顺序的影响,聚类的形状是任意的,能够较真实地反映数据分布的具体性状。算法通过比较无类标训练集样本间的距离,根据距离最近的样本首先聚合成类的特性,在每一步聚类结束时,再次比较类间距离以及计算类内数据占总数据的比率来确定异常数据类。实验证明该算法处理未知入侵检测问题的检测率为89.5%,误报率为0.4%。 An unsupervised clustering algorithm is proposed to solve the problem that most of intrusion detections based on clustering algorithm have artificial parameters. This method has no artificial parameter and is not affected by the order of data entrance. The shape of clusters is arbitrary, which can reflect the real distribution of data. By comparing the distances between unlabeled training data, the algorithm merges characters of clusters according to the characters of nearest samples. When each step of clustering is completed, the algorithm identifies the intrusion clusters by comparing the distances of clusters and calculating the rate of samples of each cluster among all samples. The identified clusters can be used in real data detection. The experimental result shows that the detection rate is 89.5% and the false alarm rate is 0.4% in detecting unknown intrusion.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2009年第3期288-292,共5页 Journal of Nanjing University of Science and Technology
基金 江苏省自然科学基金(BK2008403)
关键词 入侵检测 计算机犯罪 探测器 因特网 网络安全 无监督聚类 无类标数据 intrusion detection computer crime detectors internet network security unsupervised clustering unlabeled data
  • 相关文献

参考文献8

  • 1Ilgun K,Kemmerer R A,Porras P A.State transition analysis:A rule-basedintrusion detection system[J].IEEE Transactions on Software Engineering,1995,21(3):181-199.
  • 2Portnoy L,Eskin E,Stolfo S J.Intrusion detection with unlabeled data using clustering[A].Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA-2001)[C].Philadelphia,PA,USA:ACM,2001.1-14.
  • 3Jiang Sh Y,Song X Y,Wang H,et al.A clustering-based method for unsupervised intrusion detections[J].Pattern Recognition Letters,2006,27(7):802-810.
  • 4罗敏,王丽娜,张焕国.基于无监督聚类的入侵检测方法[J].电子学报,2003,31(11):1713-1716. 被引量:64
  • 5Han J W Kamber M 范明 孟小峰译.数据挖掘概念与技术[M].北京:机械工业出版杜,2001.147-158.
  • 6KDD Cup 1999.KDD dataset[EB/OL].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,1999-10-28.
  • 7Barbara D,Jajodia S.Applications of data mining in computer security[M].Norwell,MA,USA:Kluwer academic publish,2002.77-102.
  • 8梁铁柱,李建成,王晔.一种应用聚类技术检测网络入侵的新方法[J].国防科技大学学报,2002,24(2):59-63. 被引量:12

二级参考文献9

  • 1HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 2张平安 高春华 译.神经-模糊和软计算[M].西安交通大学出版社,2000.8-63.
  • 3Eskin E. Anomaly detection over noisy data using learned probability distributions[A]. Proceedings of the International Conference on Machine Learning, 2000.
  • 4Axelsson Stefan. Intrusion Detection Systems: A Survey and Taxonomy[EB]. http://citeseer.nj.nec.com/sc, 2000.
  • 5Bonifacio J M, Cansian A M. Neural Networks Applied in Intrusion Detection Systems[EB]. http://citeseer.nj.nec.com/sc, 2000.
  • 6Lee W , Stolfo S J. Data Mining approaches for intrusion detection[A]. Proceedings of the 1998 USENIX Security Symposium, 1998.
  • 7KDD Cup 1999 Data[EB]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. 1999.
  • 8蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:369
  • 9刘海峰,卿斯汉,蒙杨,刘文清.一种基于审计的入侵检测模型及其实现机制[J].电子学报,2002,30(8):1167-1171. 被引量:15

共引文献183

同被引文献73

引证文献8

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部