期刊文献+

基于有监督矢量的量化分析与Markov模型的异常检测方法

An Analysis Based on Supervised Vector Quantization and an Abnormity Detection Method of the Markov Model
下载PDF
导出
摘要 从分析特权进程系统调用序列的特点入手,利用矢量量化方法对特权进程的短系统调用序列进行聚类分析,进而利用Markov模型来学习聚类之间的时序关系。本方法在矢量量化中利用动态分裂算法对短系统调用序列进行聚类分析,增大了正常进程系统调用序列与异常进程系统调用序列间的差异性;在训练数据集很小的条件下使模型更精小、实时性强、占用系统资源少,适合于实时检测。 Starting with the analysis of the characteristics of command- sequence in process privilege system, this paper uses Vector Quantization method to cluster and analyze short system command - sequence and employs Markov model to study the relationship of timing sequence of clusters. In this paper, the method of using dynamic splitting calculation to cluster and analyze the command- sequence of short system in vector quantization, greatly enhance the othemess between the command - sequence of normal proceeding system and the command- sequence of abnormal proceeding system, and bring out some advantages, such as reducing the model, no timing mistakes, small occupation on system resources, timing check when the sample of practice data is small.
作者 陈志建
出处 《煤炭技术》 CAS 北大核心 2009年第9期169-171,共3页 Coal Technology
关键词 神经网络 入侵检测 有监督矢量 MARKOV模型 nerve system in break check monitoring vector markov model
  • 相关文献

参考文献9

  • 1J. P. Anderson. Conputer Security Threat Monitoring and Surveillance [J]. Technical report, April 19: 10- 11.
  • 2Lee W, Stolfo S J. Data Mining Approaches for Intrusion Detection [M]. Proceedings of the 7th USENIX Security Symopsium. San Antonio. Texas: the USENIX Association, 1998:26-29.
  • 3Wespi A, Deicer M. Intrusion Detection using Variablelength Audit Trail Patterns [M]. In workshop on the Recent Proceedings of the 3rd International Advances in Intrusion Detection Toulouse. France. 2000: 110- 129.
  • 4E.- Eskin, A. Arnold, M. Prerau. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data [M]. In D. Barbara and S. Jajodia (editors), Applications of Data Mining in Computer Security, Kluwer, 2002.
  • 5R. M. Gray. Vector Quantization [Z]. IEEE. ASSP, 1984 (1):4- 29.
  • 6Wenjie Hu, Yihua Liao. Robust Support m Computer Security, International Conference on Machine I-earning [J]. Los Angeles, CA, July 2003:235 - 246.
  • 7Warrendor. C, Forrest. S, Pearlmutter. B. Detectinglntrusion Symposium Using System Calls: Alternative Data Models [Z]. IEEE on Security and Privacy, May 1999:324- 329.
  • 8Yeung D. dynardic Ding Yuxin. Host - based intrusion detection using and static behavioral models [ J ]. Pattern Recognition, 2003,36 ( 1 ) : 229 - 243.
  • 9Hiren Shah, Jeffrey Undercoffer, Clustering for Intrusion Detection [Z]. IEEE International Conference on 2003:1277 134.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部