期刊文献+

采用压缩近邻法的高效入侵检测模型

Highly effective intrusion detection model adopting condensed nearest neighbor rules
下载PDF
导出
摘要 针对入侵检测中的实时性问题,提出了一种采用压缩近邻法的高效入侵检测模型。该模型能够用于精简训练集,从而加快入侵检测系统的训练及检测速度,提高了系统的实时性。为了对该模型的训练集精简效果和检测性能进行验证,采用著名的KDDCUP99公用数据集进行实验,并对比了该方法和其他入侵检测方法的检测效果和检测时间。结果表明,该模型能够在大幅降低训练集大小的情况下,提升入侵检测的实时性,并保持较好的检测效果,是一种高效的入侵检测模型。 Aiming at the real-time problem for intrusion detection, this paper proposed a highly effective intrusion detection model adopting condensed nearest neighbor rules, named IDMCNN. IDMCNN could be used for training set reduction, which speeded up the training and detecting function for IDS and improved the real-time ability. To verify the performance of IDMCNN on the reduced training set and intrusion detection, performed experiments on famous public dataset KDD CUP99, performance and time consuming of intrusion detection between model proposed and compared other existing approaches among each other. Demonstrated IDMCNN is a highly effective intrusion detection model that keeps performance on detection with high real-time in such a case that the size of training set have been reduced in substantially great extent.
出处 《计算机应用研究》 CSCD 北大核心 2010年第6期2341-2343,共3页 Application Research of Computers
基金 电子信息产业发展基金资助项目(信部运〔2007〕329) 国家"242"信息安全计划资助项目(2006C27)
关键词 压缩近邻法 重复剪辑近邻法 入侵检测 训练集精简 实时性 condensed nearest neighbor rule multi-edit nearest neighbors intrusion detection reduction for training set realtime
  • 相关文献

参考文献8

  • 1BACE R G.Intrusion detection[M].[S.l.] :Macmillan Technical Publishing,2000.
  • 2李辉,管晓宏,昝鑫,韩崇昭.基于支持向量机的网络入侵检测[J].计算机研究与发展,2003,40(6):799-807. 被引量:79
  • 3GUSTAVO E A,BATISTA P A,RONALDO C,et al.A study of the behavior of several methods for balancing machine learning training data[J].ACM SIGKDD Explorations,2004,6(1):20-19.
  • 4ORFILA A,CARBO J,RIBAGORDA A.Autonomous decision on intrusion detection with trained BDI agents,Butterworth-Heinemann[J].Computer Communications,2008,31(9):1803-1813.
  • 5AYDIN M A,ZAIM A H,CEYLAN K G.A hybrid intrusion detection system design for computer network security[J].Computer and Electrical Engineering,2009,35(3):517-526.
  • 6SANDHYA P,AJITH A,GROSAN C,et al.Modeling intrusion detection system using hybrid intelligent systems[J].Journal of Network and Computer Applications,2007,30(1):114-132.
  • 7SIMON T P,JUN H.A hybrid artificial immune system and self organising map for network intrusion detection[J].Information Sciences,2008,178(15):3024-3042.
  • 8http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html[EB/OL].

二级参考文献1

  • 1张学工译.统计学习理论的本质[M].北京:清华大学出版社,1995..

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部