期刊文献+

融合PCA和LDA的入侵检测算法 被引量:3

Fusion of PCA and LDA for Intrusion Detection
下载PDF
导出
摘要 针对目前单个IDS在入侵特征提取和检测效率上存在的问题,提出了一种融合主成分分析(PCA)和线性判别分析(LDA)的入侵检测算法。利用PCA和LDA提取入侵特征,通过KNN分类器给出初步的识别结果,接着采用D-S证据理论对识别结果进行融合,得出最终识别结果。通过在KDD CUP’99的标准入侵检测数据集上的实验表明,该方法提高了入侵检测率,同时降低了误报率,性能优于单一的分类器。 To solve the difficulty of feature extraction and the low performance in single IDS,an intrusion detection method based on the fusion of principal component analysis(PCA)and liner discriminate analysis(LDA)is presented. Firstly, PCA and LDA is applied to network intrusion feature extraction. Then, initial intrusion detection result is done by two KNN classifiers. Next, the D - S evidence theory is adopted to fuse these results for two classifiers can overcome the shortcomings of each other. Experiment has been done on dataset in KDD- 99 and the results show that the performance of the proposed method is superior to that of the single classifier.
作者 张瑞霞 王勇
出处 《计算机技术与发展》 2009年第11期132-134,138,共4页 Computer Technology and Development
基金 广西自然科学基金资助项目(桂科基0575094)
关键词 入侵检测 主成分分析 线性鉴别分析 D—S证据理论 分类器融合 intrusion detection PCA LDA D-S evidence theory classifiers fusion
  • 相关文献

参考文献11

  • 1Labid K, Venuri V R. Application of Principal Component Analysis to the Detection and Visualization of Computer Network Attacks [ M ]//Annals of Telecommunications. France: [s. n. ] ,2005.
  • 2Shyu M L, Chen S C, Sarinnapakom K, et al. A Novel Anormaly Detection Scheme Based on Principal Component Classitier[ C] //Proceedings of ICDM Foundation and New Direction of Data Mining workshop. [s. l. ] : [s. n. ] ,2003:172 - 179.
  • 3王坤,潘继农,张鹏,郭云飞.基于主成份分析的异常检测方法研究[J].信息工程大学学报,2004,5(3):56-59. 被引量:2
  • 4谷雨,郑锦辉,孙剑,徐宗本.基于独立成分分析和支持向量机的入侵检测方法[J].西安交通大学学报,2005,39(8):876-879. 被引量:7
  • 5田捷,杨鑫.生物特征识别技术理论与应用[M].北京:电子工业出版社,2004:183-203.
  • 6Kuncheva L. A theoretical study on six classifier fusion strategies[J]. IEEE Trans on PAMI,2002,24(2) :281 - 286.
  • 7Kitter J, Hater M, Duin R, et al. On combining classifiers[J ]. IEEE Trans on PAMI. 1998,20 (3) : 226 - 239.
  • 8David M J. Combining multiple classifiers by averageing or by mulitiplying[ J ]. Pattern Recognition,2000,33:1475 - 1485.
  • 9王勇,王行愚,张瑞霞.基于D-S证据理论的分布式入侵检测方法研究[J].计算机工程与应用,2004,40(13):167-169. 被引量:7
  • 10徐耀红.数据融合理论与应用[M].西安:西安电子科技大学出版社,1998.

二级参考文献16

  • 1[1]E Eskin. Anomaly detection over noisy data using learned probability distributions [A]. In Proc. 17th International Conf.on Machine Learning [C] . Morgan Kaufmann, San Francisco,CA,2000,255 - 262.
  • 2[2]L Portnoy,E Eskin, S J Stolfo. Intrusion detection with unlabeled data using clustering [ A ] . In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001 ) [ C ]. Philadelphia, PA, 2001.
  • 3[3]E Eskin, A Arnold, M Prerau, et al. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled Data [ A ]. To Appear in Data Mining for Security Applications [ C ]. Kluwer, 2002.
  • 4[5]Lindsay I Smith. A tutorial on Principal Components Analysis.[EB/OL]. http://www. snl. salk. edu/~ shlens/pub/notes/pca. pdf, 2003-03.
  • 5[6]J P MARQUES DE S.模式识别-原理、方法及应用[M].北京:清华大学出版社,2002.
  • 6[7]Y Yang. An Evaluation of Statistical Approaches to Text Categorization [ M ]. Kluwer Academic Publishers, Netherlands,1999.
  • 7[8]KDD Cup 1999 Data. http://kdd. ics. uci. edu/databases/kddcup99/kddcup99. html, 2003.8.
  • 8Liu Yanheng, Tian Daxin, Wang Aimin. ANNIDS: intrusion detection system based on artificial neural network [A]. 2003 International Conference on Machine Learning and Cybernetics, Xi′an, China, 2003.
  • 9Kumar S. Classification and detection of computer intrusions [D]. PhD Thesis. West Lafayette, USA: Department of Computer Science, Purdue University, 1995.
  • 10Zhao Junzhong, Huang Houkuan. An evolving intrusion detection system based on natural immune system[A]. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering, Beijing, China, 2002.

共引文献43

同被引文献22

引证文献3

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部