期刊文献+

基于SVDD的半监督入侵检测研究 被引量:6

Semi-supervised Intrusion Detection Research Based on SVDD
下载PDF
导出
摘要 提出了一种基于SVDD的半监督入侵检测算法.该算法利用少量有标记正常网络数据建立两个SVDD分类器,通过相互学习来挖掘未标记数据中的隐含信息,扩大有标记正常网络数据的数量.再利用所有已标记正常网络数据用不同的单分类方法建立多个单类分类器,通过集成学习的方法得到最终的分类器.实验表明,该算法具有良好的识别性能. In this paper a new semi-supervised intrusion detection algorithm based SVDD is proposed to solve the problem which has only some labeled normal network data and lots of unlabeled data. In this proposed algorithm two SVDD elassitiers are built firstly respectively for the known labeled normal data, then some information under the unlabeled data is mined by the two classifiers. And the known labeled target data is enlarged by the co-learning. At last the enlarged labeled target data is used to train three classifiers, and the ensemble learning is used to get the final classifier. The proposed algo-rithm has better recognition performance.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第10期128-130,共3页 Microelectronics & Computer
基金 国家自然科学基金项目(60603029) 江苏省自然科学基金(BK2005009)
关键词 入侵检测 半监督学习 集成学习 CO-TRAINING 单类分类器 intrusion detection semi-supervised learning ensemble learning co-training one-class classification
  • 相关文献

参考文献7

  • 1Nigam K, McCallum A K, Thnm S, et al. Text classification from labeled and unlabeled documents using EM [ J ]. Machine Learning, 2000,39(2/3) : 103 - 134.
  • 2Zhou D, Bousquet O, Lal T N, et al. Learning with local and gobal consistency [J ]. Advances in Neural Information Processing Systems, 2004(16) :321 - 328.
  • 3Blum A, Mitchell T. Combining labeled and unlabeled data with co-training[C]// COLT. Pittsburgh: Carnegie Mellon University, 1998.
  • 4Zhou Z H, Li M. Tri - training: exploiting unlabeled data using three classifiers[J]. IEEE TKDE, 2005, 17(11): 1529- 1541.
  • 5Liu B, Lee W S, Yu P. Partially supervised classification of text documents[ C] // Proceedings of the Nineteenth International Conference on Machine Learning. New York: 2002: 387 - 394.
  • 6Wang C, Ding C, Meraz R F, et al. PSoL: a positive sample only learning algorithm for finding non - coding RNA genes [ J ]. Bioirgformatics, 2006, 22 (21) : 2590 - 2596.
  • 7Breirnan L. Bagging predictors[ J ]. Machine Learning, 1996,24(2) :123 - 140.

同被引文献50

  • 1杨武,方滨兴,云晓春,张宏莉,胡铭曾.一种高性能分布式入侵检测系统的研究与实现[J].北京邮电大学学报,2004,27(4):83-86. 被引量:14
  • 2李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 3田俊峰,赵卫东,杜瑞忠,蔡红云.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115-120. 被引量:15
  • 4周荃,王崇骏,王珺,周新民,陈世福.基于人工智能技术的网络入侵检测的若干方法[J].计算机应用研究,2007,24(5):144-149. 被引量:32
  • 5戴英侠.系统安全与人侵检测[M].北京:清华大学出版社,2002.
  • 6Denning D E. An Intrusion Detection Model [ J ]. IEEE Transaction on Software Engineering,2010,13 (2) :222 - 232.
  • 7Durga Prasad Muni, Nikhil R Pal,Jyotirmoy Das. Genetic programming for simultaneous feature selection and classifier design [ J ]. IEEE Transactions on Systems, Man, and Cybernetics-Part B, February, 2009,36 ( 1 ) : 106 - 117.
  • 8Kennedy J, Eberhart R C. Particle swarm optimization [ C ]//Proc of IEEE International Conference on Neural Networks,USA:IEEE Press, 2005 : 1942 - 1948.
  • 9Mehrabian A R, Lueas C. A novel numerical optimization algorithm in- spired from weed colonization [ J ]. Ecological lnfomlatics, 2006, l (3) :355 - 366.
  • 10Mallahzadeh A R, Oraizi H, Davoodi R Z. Application of the invasive weed optimization technique for antenna configurations[ J]. Progress in Electromagnetic Research,2008,20 ( 79 ) : 137 - 150.

引证文献6

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部