期刊文献+

入侵检测的可进化模糊规则分类器研究

A Study of the Evolving Fuzzy Rule-Based Classifier in Intrusion Detection
下载PDF
导出
摘要 随着入侵检测技术(IDS)在网络安全领域的作用越来越重要,将多种软计算方法应用到入侵检测技术中是构建智能入侵检测系统的新途径和尝试。本文将模糊数据挖掘技术和遗传算法相结合,提出一种基于遗传算法的模糊规则反复学习的方法,构造具有自适应能力的分类器,并进一步应用到计算机网络的入侵检测中。仿真测试证明了该方法的有效性。 Intrusion detection techniques become increasingly important in the area of network security. It is a novel attempt that various soft computing approaches are applied to the intrusion detection field. This paper combines the fuzzy data mining technology and genetic algorithms, describes a fuzzy genetic-based learning algorithm, constructs a fuzzy rule classifier and discusses its usage to further detect intrusion in a computer network. Experimental results indicate the efficiency of the algorithm.
出处 《计算机工程与科学》 CSCD 北大核心 2009年第8期36-38,共3页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60874113) 福建省教育厅科技基金资助项目(JA05300)
关键词 入侵检测 模糊逻辑 遗传算法 分类器 intrusion detection fuzzy logic genetic algorithm classifier
  • 相关文献

参考文献6

二级参考文献37

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2JAMES Cannady. Artificial Neural Networks for Misuse Detedtion[ C]. NISSC'98,1998.
  • 3XIN Jiangqing, ICKERSON John E, DICKERSON Julie A. Fuzzy Feature Extraction and Visualization for Intrusion Detection [ C ]. The IEEE International Conference On Fuzzy Systems, 2003. 1249 -1254.
  • 4LIU Min, LING Yean Yng. Using Fuzzy Neural Network Approach to Estimate Contractor' s Markup [ J ]. Building and Enviroment, 2003, 38:1303 - 1308.
  • 5JUANG Chia- feng. Temporal Problem Solved by Dynamic Fuzzy Network Based on Genetic Algorithm with Varible -length Chuomosomes[ J].Fuzzy Sets and Systems, 2004,142:199 - 219.
  • 6BRIDGES Susan, VAUGHN Rayford. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection[ C]. Proceedings Twenty Third National Information Security Conference, October. 2000, 1-19.
  • 7ISHIBUCHIi Hy, NAKASHIMA T. Linguistic Rule Extraction by Genetic - based Machine Learning [ C ]. Proceedings Genetic and Evolutionary Computation Conference GECCO00,2000.
  • 8REITH M,CARR C.An examination of digital forensics models[J].Journal of Digital Evidence,2002,1(3):1-12.
  • 9MARCUS K,KATE S.The future of computer forensics:a needs analysis survey[J].Computers & Security,2004,1(23):12-16.
  • 10SARAH M.Building theoretical underpinnings for digital forensics research[J].Digital Investigation,2004,1(1):61-68.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部