期刊文献+

基于KPCA和SVM的网络入侵检测研究 被引量:10

Research on Intrusion Detection System Based on KPCA and SVM
下载PDF
导出
摘要 研究无线网络安全检测,针对入侵检测存在先验知识少的情况下推广能力差的问题,为了保证网络运行的安全性,提出了利用核主成分分析(KPCA)和支持向量机(SVM)相结合进行入侵检测的方法。首先用核主元分析对输入变量进行特征提取,消除变量之间的相关性,然后运用网格算法对核参数进行了寻优,通过交叉验证的方法对支持向量机进行参数选择,最后利用所建立好的模型进行预测。利用方法对KDD CUP99数据集进行仿真实验,与传统算法相比,方法对网络入侵检测有很高的识别率,为网络入侵检测提供了依据。 Current IDS is an important part of network security.Current IDS has poor generalization ability when given less priority knowledge.In this paper,the KPCA and SVM are adopted to implement intrusion detection.The Kernel Principal Component Analysis method can not only solve the linear correlation of the input but also compress the data.The kernel parameters of KPCA are optimized by grid algorithm and the parameters of support vector machine model are selected by cross validation method.Compared with traditional algorithms,this method can achieve higher detection rate and better generalization,and decrease the time of performance.In the end of the paper,the experiment on KDD CUP99 data set shows the effectiveness and excellent performance of the method.
作者 顾钧
出处 《计算机仿真》 CSCD 北大核心 2010年第7期105-107,共3页 Computer Simulation
关键词 核主成分分析 支持向量机 入侵检测 Kernel principal component analysis(KPCA) Support vector machines(SVM) Intrusion detection
  • 相关文献

参考文献9

二级参考文献29

  • 1杜晓东,李岐强.支持向量机及其算法研究[J].信息技术与信息化,2005(3):37-40. 被引量:12
  • 2陶晓燕,姬红兵,马志强.基于样本分布不平衡的近似支持向量机[J].计算机科学,2007,34(5):174-176. 被引量:10
  • 3瓦普尼克(美)著 张学工译.统计学习理论的本质[M].北京:清华大学出版社,2000..
  • 4边肇祺 张学工.模式识别[M].北京:清华大学出版社,1999.282-283.
  • 5边肇祺 张学工等.模式识别:第2版[M].北京:清华大学出版社,1999.30.136.
  • 6Agarwal M V Joshi. PNmle: A new Framework for Learning Classifter Models in Data Mining( A Case - Study in Network Intrusion Detection) [ C ]. Proceedings of the First SIAM Conference on Data Mining. Chicago, USA, 2001.
  • 7I Levin. KDD -99 Classifier Learning Contest LLSoft's Results Overview [ J ]. SIGKDD Explorations, ACM SIGKDD, January 2000, 1 (2):67-75.
  • 8Maheshkumar Sabhnani, Gursel Serpen. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context [ C ]. Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications. MLMTA'03, June, 2003, Las Vegas, Nevada, USA: 209 -215.
  • 9S Mukkamala, A H Sung. Feature ranking and selection for intrusion detection[C]. Proceedings of the International Conference on Information and Knowledge Engineering. June, 2002. 503 -509.
  • 10Haijun Xiao, Fan Hong, Zhaoli Zhang and Junguo Liao. Application of PSVM and Data Processing for Intrusion Detection [ C ]. Proceedings of International conference on Bio - Inspired Computing: Theory and Applications (BIC- TA 2006).

共引文献2335

同被引文献81

引证文献10

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部