期刊文献+

基于粗糙集理论与核匹配追踪的入侵检测 被引量:2

Intrusion detection based on rough set theory and kernel matching pursuit
下载PDF
导出
摘要 提出一种将粗糙集理论与核匹配追踪算法结合起来的入侵检测方法,利用粗糙集理论在处理大数据量、消除冗余信息等方面的优势,减少机器训练数据,克服支持向量机(SVM)等算法因为数据量大而处理速度慢的缺点。同时,借助核匹配追踪良好的分类识别性能,并对每个样本作出不同的重要性定义,对粗糙集约筒后的最小属性子集进行分类,实现入侵检测的快速、高分类精度和高检测率。实验结果表明,该方法优于单纯采用粗糙集或人工免疫的方法。 An intrusion detection method combinding Rough Set (RS) theory and Kernel Matching Pursuit (KMP) algorithm was proposed.In virtue of the ability that rough set can decrease the amount of data and get rid of redundancy,the proposed method could reduce the amount of machine training data,and overcome the disadvantage of slow processing speed because of large amount data in Support Vector Machine (SVM) algorithms.Meanwhile,KMP algorithm,with the help of good classification and recognition,made a different definition of importance on each sample,so that the core of property set could be classified,and intrusion detection could be realized rapidly with high classification accuracy and high detection rate and so on.The experimental results show that this method is better than the method based on RS only and the method based on Artificial Immune (AI).
出处 《计算机应用》 CSCD 北大核心 2010年第5期1202-1205,共4页 journal of Computer Applications
基金 重庆邮电大学自然科学基金资助项目(A2008-04)
关键词 入侵检测 粗糙集理论 核匹配追踪 机器学习 intrusion detection rough set theory Kernel Matching Pursuit (KMP) machine learning
  • 相关文献

参考文献11

  • 1FORREST S,PERRELASON A S,ALLEN L,et al.Self-nonself discrimination in a computer[C]// Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy.Washington,DC:IEEE Computer Society,1994:202-212.
  • 2SUNG A H,MUKKAMALA S.Identifying important features for intrnsion detection using support vector machines and neural networks[C]// Proceedings of the 2003 Symposium on Applications and the Internet.Washington,DC:IEEE Computer Society,2003:209.
  • 3饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 4蔡忠闽,管晓宏,邵萍,彭勤科,孙国基.基于粗糙集理论的入侵检测新方法[J].计算机学报,2003,26(3):361-366. 被引量:57
  • 5彭宏.基于粗糙集理论的入侵检测方法研究[J].电子科技大学学报,2006,35(1):108-110. 被引量:13
  • 6PAWLAK Z.Rough sets and decision analysis[J].Information Sciences,2000,38(3):132-144.
  • 7STEFANOWSKI J.On rough set based approaches to induction of decision rules[EB/OL].[2009-09-12].http://www.cs.put.poznan,pl/jstefanowski/pub/rskd98.ps.
  • 8VINCENT P,BENGIO Y.Kernel matching pursuit[J].Machine Learning,2002,48(1/3):165-187.
  • 9BURGES C J C.Geometry and invariance in kernel based method[M]//Advance in Kernel Method:Support Vector learning.Cambridge,MA:MIT Press,1999:89-116.
  • 10缑水平,焦李成.基于多尺度几何分析与核匹配追踪的图像识别[J].模式识别与人工智能,2007,20(6):776-781. 被引量:6

二级参考文献31

  • 1Forrest S,Perrelason A S,Allen L,et al.Self_nonself discrimination in a computer[C].In:Rushby J,Meadows C,eds.Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy.Oakland,CA:IEEE Computer Society Press,1994:202-212.
  • 2Ghosh A K,Michael C,Schatz M.A real-time intrusion system based on learning program behavior[A].In:Debar H,Wu SF.Recent advances in intrusion detection (RAID 2000)[C].Toulouse:Spinger-Verlag,2000.93-109.
  • 3Lee W,Stolfo S J.A data mining framework for building intrusion detection model[C].In:Proceedings of the 1999 IEEE Symposium on Security and Privacy.Oakland,CA:IEEE Computer Society Press,1999:120-132.
  • 4[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 5[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 6[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 7[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 8[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 9[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 10刘清.Rough集及Rough推理[M].北京:科学出版社,2001..

共引文献192

同被引文献23

  • 1Chirag M, Dhiren P, Bhavesh B. A survey of intrusion detection tech- niques in cloud [J]. Journal of Network and Computer Applications, 2013, 36(1), 42?57.
  • 2Faraoun K M, Boukelif A. International Journal of Computational In- telligence [J ]. Neural Networks Learning Improvement using theClustering Algorithm to Detect Network Intrusions, 2007, 3(2), 161-168.
  • 3Anil K B, Bipan T, Jayashri R. Optimization of Sensor Array in Elec- tronic Nose: A Rough Set-Based Approach[J ]. IEEE SENSORS JOUR- NAL, 2011, 11(11): 3001-3008.
  • 4Boppana R V, Su X. On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks [J]. IEEE Transactions on Mobile Computing, 2011, 10(8): 1162-1174.
  • 5Ma L C, Min Y, Pei Q Q. A Dynamic Intrusion Detection Mechanism Based on Smart Agents in Distributed Cognitive Radio Networks [J ]. Ge- netic and Evolutionary Computing, 2014, 238(2), 283-290.
  • 6Valenzuela J, Wang J H, Bissinger N. Real-time intrusion detection in power system operations[J ]. IEEE Transactions on Power Systems, 2013, 28 (2), 1052-1062.
  • 7Fung C J, Zhang J, Boutaba R. Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks [J]. IEEE Transactions on Network and Service Management, 2012, 9(3): 320-332.
  • 8Chirag M,Dhiren P,Bhavesh B.A survey of intrusion detection techniques in cloud[J].Journal of Network and Computer Applications,2013,36(1):42-57.
  • 9Faraoun K M,Boukelif A.International Journal of Computational Intelligence[J].Neural Networks Learning Improvement using the Clustering Algorithm to Detect Network Intrusions,2007,3(2):161-168.
  • 10Boppana R V,Su X.On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks[J].IEEE Transactions on Mobile Computing,2011,10(8):1162-1174.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部