期刊文献+

模糊逻辑理论在入侵检测系统中的应用研究 被引量:3

Application research of fuzzy logic theory in intrusion detection systems
下载PDF
导出
摘要 通过基于模糊逻辑的数据挖掘方法实现特征选择,使用模糊逻辑推理进行数据分析,以及支持响应回卷的模糊默认逻辑推理处理预警响应,使得入侵检测系统在特征选择和预警响应方面得到改善。实验结果显示,该检测方法能够有效检测入侵攻击,具有较低的误报率和漏报率。 A data mining method based on fuzzy logic for feature selection,data analysis based on fuzzy logic reasoning for intrusion analysis,and fuzzy default logic reasoning which supports response rollback for alert response are used,which make the Intrusion Detection System (IDS) improved in the aspects of feature selection and alert response.The experiments show that with the method,intrusion attacks can be detected effectively and precisely.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第8期110-112,共3页 Computer Engineering and Applications
基金 河北省自然科学基金Grant No.F2009000477~~
关键词 入侵检测 模糊逻辑 响应回卷 KDD CUP 99 intrusion detection fuzzy logic response rollback KDD CUP 99
  • 相关文献

参考文献9

  • 1伍良富.一种基于神经网络的黑客入侵检测新方法[J].小型微型计算机系统,2003,24(8):1459-1461. 被引量:8
  • 2Iigun K,Kemmerer A.State transition analysis:A rule based intrusion detection approach[J],IEEET Trans on Software Engineering, 1995,21(3) : 181-199.
  • 3Chuang C,Jeng J.A soft computing technique for noise data with outliers[C]//Proceedings of the 2004 IEEE International Conference on Networking Sensing & Control,Taipei,Taiwan,March 2004:1171- 1176.
  • 4Mohajeranim,Moeinia, Kianiem.NFIDS:A neuro_fuzzy intrusion detection system:Electronics[C]//10th IEEE International Conference on Circuits and Systems, 2003 : 351-354.
  • 5Yang Bing-ru.Knowledge engineering and knowledge discovery[M]. Beijing:Metallurgy Industry Press,2000.
  • 6He Xin-gui.Fuzzy theories and fuzzy techniques in knowledge processing[M].Beijing:National Defense Industry Press,1998.
  • 7张剑,龚俭.一种基于非单调逻辑理论的入侵检测系统[J].计算机学报,2003,26(9):1060-1067. 被引量:2
  • 8Lee W,Miller M, Stolfo S,et al.Toward cost-sensitive modeling for intrusion detection and response[J].Joumal of Computer Security, 2002,10( 1 ) : 318-336.
  • 9KDD Cup 99 Intrusion detection dataset[EB/OL].http://kdd.ics.uci. edu/databases/kddcup99/kddcup99.htm.

二级参考文献7

  • 1Lee W, Stolfo S J and Mok K. Data mining in work flow environments : Experiences in intrusion detection[C]. In : Proceedings of 1999 Conference on Knowledge Discovery and Data Mining(KDD-99),1999.
  • 2Christina Warrender, Stephanie Forrest, and Barak Pearlmutter.Detecting intrsions using system calls : alternative data models[C]. Inz Proceedings of the 1999 IEEE Symposium on Securityand Privacy, 135~145. IEEE Computer Society, 1999.
  • 3Li Tao. The fundamental theory of big-neuron[C]. Proc. of ICNNSP95,Nanjing,China, 1995.12.
  • 4Dickerson J E, Juslin J, Koukousoula O, Dickerson J A. Fuzzy intrusion detection. In: Proceedings of IFSA World Congress.and 20th NAFIPS International Conference, Vancouver, British Columbia, 2001. 1506-1510.
  • 5Siraj A, Bridges S M, Vaughn R B. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. In:Proceedings of IFSA World Congress and 20th NAFIPS International Conference, Vancouver, British Columbia, 2001..2165-170.
  • 6Geib C W, Goldman R P. Plan recognition in intrusion detection system. In.. Proceedings of DARPA Information Survivability Conference - Exposition II,Hilton Anaheim, California, 2001.46-55.
  • 7Lee Wenke, Fan Wei, Miller Matthew, Stolfo Sal, Zadok Erez.Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 2002, 10(1) : 318-336.

共引文献8

同被引文献25

  • 1Zadch L A.Toward a Gencralized Theory of UncetaJnty(GTU)- an outline[J].Infonnation Sciences,2005,172:1-40.
  • 2Ho N C.A topological completion of refined hedge algebras and a model of fuzziness of linguistic terms and hedges[J].Fuzzy Sets and Systems,2007,158:436-451.
  • 3Martinez L,Ruan D,Herrera F.Computing with words in deci- sion support systems:an overview on models and applications[J]. International Journal of Computational Intelligence Systems,2010, 3(4) :382-395.
  • 4Dubois D, Gottwald S, Hajek P, et al.Terminologica! difficulties in fuzzy set theory-the case of intuitionistic fuzzy sets[J].Fuzzy Sets and Systems, 2005,156: 496-499.
  • 5Xu Z S.Models for multiple attribute decision making with intu- itionistic fuzzy information[J].International Journal of Uncertain- ty,Fuzziness and Knowledge-Based Systems, 2007,15: 285-297.
  • 6Xu Z S, Chen J,Wu J J.Clustering algorithm for intuitionistic fuzzy sets[J].Information Sciences, 2008,178: 3775-3790.
  • 7Xu Y,Ruan D,Qin K Y,et al.Lattice-valued logic[M].[S.l.]: Springer, 2004.
  • 8Xu Y,Liu J,Ruan D,et al.On the consistency of rule bases based on lattice-valued first-order logic LF(X)[J].international Journal of Intelligent Systems, 2006,21 : 399-424.
  • 9Zou L, Ruan D, Pei Z, et al.A linguistic truth-valued reasoning approach in decision making with incomparable information[J]. Journal of Intelligent and Fuzzy Systems, 2008,19(4/5) : 335-343.
  • 10Zou L, Liu X, Wu Z, et al.A uniform approach of linguistic troth values in sensor evaluation[J].Intemational Journal of Fuzzy Optimization and Decision Making, 2008,7(4) : 387-397.

引证文献3

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部