期刊文献+

一种基于孤立点挖掘的入侵检测技术 被引量:1

Intrusion Detection Method Based on Outlier Mining
下载PDF
导出
摘要 探讨基于孤立点挖掘的异常检测的可行性,将基于2k-距离的孤立点挖掘方法应用到入侵检测中,并针对该方法无法很好地处理符号型属性数据的问题,采用编码映射方法对符号型数据进行处理,同时利用主成分分析来实现对编码映射后扩展的属性进行降维。详细阐述了具体实现方案,并通过仿真实验验证了该方法的可行性。 The feasibility of the anomaly detection based on the outlier mining is discussed.The anomaly detection method is presented.The outlier detection method based on similar coefficient sum is applied to the intrusion detection.In order to overcome the poor ability of outlier detection techniques,the code mapping method is adopted to process sign type data.The dimension reduction of the mixed attribute expanded after code mapping was realized by the principal components analysis(PCA).The feasibility of the method was verified with a simulation experiment.
作者 杨程程 黄斌
机构地区 长安大学 莆田学院
出处 《现代电子技术》 2010年第11期114-116,120,共4页 Modern Electronics Technique
关键词 入侵检测 孤立点 2k-距离 编码映射 主成分分析 intrusion detection outlier detection 2k-distance code mapping principal component analysis
  • 相关文献

参考文献7

  • 1HAN J,KAMBER M.Data mining:concepts and techniques[M].San Fransisco:Morgan Kaufmann Publishers,2000.
  • 2罗敏,王丽娜,张焕国.基于无监督聚类的入侵检测方法[J].电子学报,2003,31(11):1713-1716. 被引量:64
  • 3PORTNOY L,ESKIN E,STOLFO S.Intrusion detection with unlabeled data using clustering[J] //ACM.Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001).Philadelphia:ACM CSS,2001:156-166.
  • 4BRUGGER Terry.KDD99 Cup dataset[DB/OL].[2007-09-15].Http://kdd.ics.uci.edu/databases/kd-dcup99/kdd-cup99.html.1999.
  • 5姜灵敏.基于相似系数和检测孤立点的聚类算法[J].计算机工程,2003,29(11):183-185. 被引量:19
  • 6MUKKAMALA S,JANOSKI G,SUNG AH.Intrusion detection using support vector machines and Reural networks[J].Proc.of the IEEE Int'I Joint Conf.on Neural Networks,2002:1702-1707.
  • 7DUDA R o,HART P E,STORK D G.Pattern classification[M].2nd edition,Beijing:China Machine Press,2004.

二级参考文献9

  • 1Han J, Kamber M. Data Mining: Concepts and Techniques. Copyright by Morgan Kaufmann Publishers, Inc.2001.
  • 2Barnett V, Lewis T. Outliers in Statistical Data. New York: John Wiley &Sons, 1994.
  • 3Knorr E, Ng R. A Unified Notion of Outliers : Properties and Computation. In proc. 1997 Int. Conf. Knowledge Discovery and Data Mining(KDD97), Newport Beach,CA, 1997-08:219-222.
  • 4Knorr E, Ng R. Algorithms for Mining Distance-based Outliers in Large Datasets.In Proc. 1998 Int. Conf. Very Large Data Base(VLDB98), New York, 1998-08:392-403.
  • 5Aming A, Agrawal R, Raghavan P. A Linear Method for Deviation Detection in Large Database. In Proc. 1996 Int. Conf. Data Mining and Knowledge Discovery(KDD96), Portland, OR, 1996-08:164-169.
  • 6HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 7蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 8迟国泰,郝君,徐琤,朱战宇.信贷风险评价指标权重的聚类分析[J].系统工程理论方法应用,2001,10(1):64-67. 被引量:36
  • 9刘海峰,卿斯汉,蒙杨,刘文清.一种基于审计的入侵检测模型及其实现机制[J].电子学报,2002,30(8):1167-1171. 被引量:15

共引文献79

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部