期刊文献+

网络入侵检测中属性分组的随机森林算法 被引量:2

Random Forests Algorithm with Feature Grouping in Network Intrusion Detection
下载PDF
导出
摘要 入侵检测是数据挖掘的一个重要应用领域,目前基于数据挖掘的入侵检测方法很多,而基于随机森林的方法具有比较好的性能,但仍存在一些问题。通过分析网络入侵数据得到不同输入属性与分类结果的关系,提出了一种基于属性分组的随机森林算法,并应用该算法对KDD’99数据集分类。实验结果表明,该算法的训练速度和分类准确率都比原算法有较大提高。 Intrusion detection is one of the important application areas of data mining. At present, there are many approaches of intrusion detection based on data mining. Although random forests method has shown better performance than some other methods, but it still has some problems. After analyzing the network intrusion data set we get the relationship between the different input features and the result of classification, so we propose a new random forests algorithm based on feature grouping, and then we applied it in KDD' 99 data set. The test result of our new algorithm show that this method is much better than before in accuracy and speed.
作者 李升 宋舜宏
机构地区 电子工程学院
出处 《计算机安全》 2009年第11期23-25,28,共4页 Network & Computer Security
关键词 入侵检测 随机森林算法 属性分组 分类 intrusion detection random forests algorithm feature grouping classification
  • 相关文献

参考文献3

二级参考文献20

  • 1Denning D. Intrusion-Detection model. IEEE Trans. on Software Engineering, 1987,SE-13(2):222-232.
  • 2Lee W, Stolfo SJ, Mok KW. A mining framework for building intrusion detection models. In: Proc. of the 1999 IEEE Symp. on Security and Privacy. 1999. 120-132.
  • 3Mukkamala S, Janoski G, Sung AH. Intrusion detection using support vector machines and neural networks. In: Proc. of the IEEE Int'l Joint Conf. on Neural Networks. 2002. 1702-1707.
  • 4Mukkamala A, Sung AH. Identifying significant features for network forensic analysis using artificial intelligence techniques. Int'l Journal on Digital Evidence, 2003,1 (4): 1-17.
  • 5Nguyen BV. Introduction support vector machines and application to the computer security of anomaly detection. Presentation at Applied and Computational Mathematics Seminar. 2003-07.
  • 6Denning DE. Protection and defense of intrusion. Presented at Conf. on National Security in the Information Age, US Air Force Academy, 1996.
  • 7Breiman L. Random forests. Machine Learning, 2001,45(1):5-32.
  • 8Breiman L. Manual on setting up, using, and understanding random forests V4.0. 2003. http://oz. Berkeley.edu/users/breiman/Using_random_forests_V4.0.pdf
  • 9Remlinger K. Introduction and application of random forest on high thoughput screening data from drug discovery. In: Proc. of the Workshop for the SAMSI Program on Data Mining and Machine Learning. 2003.
  • 10Amit, Y, Geman D. Shape quantization and recognition with randomized trees. Neural Computation, 1997,9(7),1545-1588.

共引文献17

同被引文献12

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部