期刊文献+

基于混沌同步的网络入侵检测方法 被引量:3

An Intrusion Detection Method Based on Chaotic Synchronization
下载PDF
导出
摘要 针对目前入侵检测系统已使用的ARMA等线性检测方法,引入了动力学的混沌同步思想,提出了一种基于混沌同步的网络入侵检测方法,从非线性信号处理角度进行检测.使用高斯混合模型(GMM)结合期望最大化(EM)算法对网络数据流建模,估计GMM的3个参数向量.取待检测网络数据流参数向量与正常数据流参数向量的差值作为Liu混沌系统的混沌同步控制量,当待检测数据流存在入侵信号时,波形会产生振荡,只要选取适当的判决门限即可准确判定入侵信号.利用MIT林肯实验室DARPA数据库对系统进行仿真实验,并与ARMA模型相比,结果表明,所提出的方法对入侵检测具有更高的检测率和更低的误警率. An intrusion detection method based on chaotic synchronization was proposed. The network flow can be modeled by using Gaussian mixture model (GMM) combined with expectation maximization (EM) algorithm, and then the three parameter vectors can be estimated. By taking the difference between the normal flow data and the data for detection as Liu chaotic synchronization^s control measure, when it has intrusion signals, the wave plot would be oscillating, which is the feature of intrusion. When selecting the suitable threshold, the intrusion signals can be detected accurately. According to the simulations based on the DARPA datasets of MIT Lincoln lab and the comparisons with the intrusion detection system (IDS) based on autoregressive moving average (ARMA) model, the results show that the detective probabilities are higher and the false alarm rates are lower by using this proposed method.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2009年第12期1874-1880,共7页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60802058) 教育部留学回国人员科研启动基金资助项目
关键词 网络入侵检测 高斯混合模型 期望最大化算法 LIU混沌系统 混沌同步 network intrusion detection Gaussian mixture model (GMM) expectation maximization algorithm (EM) Liu chaotic system chaotic synchronization
  • 相关文献

参考文献10

  • 1Wu C F J. On the convergence properties of the EM algorithm [J]. Annals of Statistics, 1983,11 : 95-103.
  • 2Meir Feder, Ehud Weinstein. Parameter estimation of superimposed signals using the EM algorithm [J]. IEEE Trails on Acoustics, Speech, and Signal Processing, 1988, 36(4): 477-489.
  • 3王发强,刘崇新.Liu混沌系统的线性反馈同步控制及电路实验的研究[J].物理学报,2006,55(10):5055-5060. 被引量:35
  • 4Pecora L M, Carroll T L. Synchronization in chaotic system [J]. Physical Review Letters, 1990, 64 (6) 821-824.
  • 5陈志盛,孙克辉,张泰山.Liu混沌系统的非线性反馈同步控制[J].物理学报,2005,54(6):2580-2583. 被引量:77
  • 6Chen G, Lu J. Dynamical analysis, control and synchronization of the lorenz systems family [M]. Bei- jing: Science Press, 2003.
  • 7Lippmann R P, Fried D J, Graf I, et al. Evaluating intrusion detection systems: the 1998 DARPA offline intrusion detection evaluation [J]. DARPA Information Survivability Conference and Exposition, 2000, 2(1) : 12-26.
  • 8胡国杰,冯正进.基于混沌同步的混沌加密系统安全性[J].上海交通大学学报,2003,37(10):1588-1591. 被引量:3
  • 9Di He, Henry Leung. Network intrusion detection using CFAR abrupt-change detectors [J]. IEEE Trails on Instrumentation and Measurement, 2008,57 (3): 490-497.
  • 10Rasmussen K B. Maximum likelihood estimation of the parameters of non-minimum phase and non-causal ARMA models [J]. IEEE Transactions on Signal Pro- eessing, 1994, 42(1):209-211.

二级参考文献17

  • 1高铁杠,陈增强,袁著祉.基于部分变量反馈的混沌系统控制[J].物理学报,2004,53(10):3274-3279. 被引量:6
  • 2王建根,赵怡.Chen系统和一类统一混沌系统的同步控制[J].电路与系统学报,2004,9(6):57-60. 被引量:9
  • 3陈志盛,孙克辉,张泰山.Liu混沌系统的非线性反馈同步控制[J].物理学报,2005,54(6):2580-2583. 被引量:77
  • 4Short K. Steps toward unmasking secure communications[J]. Int'l J of Bifur Chaos, 1994, 4 (4) : 959 -977.
  • 5Short K. Unmasking a modulated chaotic communications scheme[J]. Int'l J of Bifur Chaos,1996,6(2):367-375.
  • 6Yang T, WuC W, Chua L O. Cryptography based on chaotic systems [J ]. IEEE Trans CAS I, 1997,44 : 469-472.
  • 7Schneier B. Applied cryptography: protocols, algorithms, and source code in C[M]. New York:Wiley,1996.
  • 8Baier G, Sahle S. Design of hyperchaotic flows[J].Phys Rev E,1995,51:2712-2714.
  • 9Parlitz U, Kocarev L. Using surrogate data analysis of unmasking chaotic communication systems [J].Int'l J of Bifur Chaos, 1997,7 (3) : 407 - 413.
  • 10Michalewicz Z. Genetic algorithms+data structures=evolution programs[M]. New York: Springer, 1996.

共引文献109

同被引文献10

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部