期刊文献+

优化网络入侵特征库的量子进化算法 被引量:2

Quantum evolutionary algorithm for optimizing network intrusion signature database
下载PDF
导出
摘要 针对网络入侵检测系统中入侵特征库的性能普遍较差的缺点,提出了一种优化网络入侵特征库的改进量子进化算法(IQEA)。采用特征向量表示染色体结构,借鉴小生境协同进化思想初始化种群,以个体的匹配程度设计适应度函数,使用动态更新和"优体交叉"策略进化种群。仿真实验表明,IQEA的寻优能力和收敛速度均优于量子进化算法和进化算法,经IQEA优化后的入侵特征库,检测能力强,并具有较好的自适应性。 Concerning the poor performance of the intrusion signature database in network intrusion detection system the Improved Quantum Evolutionary Algorithm IQEA of optimizing network intrusion signature database was proposed in this paper.The IQEA adopted eigenvector to express chromosome structure initialized population based on the idea of niche cooperative evolutionary designed the fitness function based on the matching degree of individual and used the strategy about the dynamic update of quantum rotation corner and the cross of excellent individuals to evolve population.The simulation results show that the IQEA is superior to QEA and EA in search ability and convergence rate and the intrusion signature database optimized by IQEA has better detection ability and self adaptability.
作者 张宗飞
出处 《计算机应用》 CSCD 北大核心 2010年第8期2142-2145,共4页 journal of Computer Applications
基金 浙江省教育厅科研项目(Y200909706)
关键词 入侵特征库 量子进化算法 改进量子进化算法 进化算法 intrusion signature database Quantum Evolutionary Algorithm QEA Improved Quantum Evolutionary Algorithm IQEA Evolutionary Algorithm EA
  • 相关文献

参考文献8

  • 1隋毅,杜跃进.NIDS的改进研究[J].计算机工程,2007,33(9):120-122. 被引量:6
  • 2郭慧玲,唐勇,张冬丽.遗传算法在入侵检测规则提取中的应用[J].哈尔滨工业大学学报,2009,41(1):248-250. 被引量:9
  • 3WEI Y X,WU M Q.Intrusion detection technology based on CE-GA-SVM[C] // Proceedings of 3rd Int Conference on Security and Privacy in Communication Networks.Washington,DC:IEEE,2007:123-128.
  • 4HAN K H,KIM J H.Quantum-inspired evolutionary algorithm for a class of combinatorial optimization[J].IEEE Transactions on Evolutionary Computation,2002,6(6):580-593.
  • 5HAN K H,KIM J H.Quantum-inspired evolutionary algorithm witha new termination criterion,Hegate and two-phase scheme[J].IEEE Transactions on Evolutionary Computation,2004,8(2):156 -169.
  • 6YANG S,WANG M,JIAO L.A novel quantum evolutionary algorithm and its application[C] // Proceedings of 2004 IEEE Congress on Evolutionary Computation.Washington,DC:IEEE,2004:820 -826.
  • 7HAN K H,KIM J H.On setting the parameters of quantum-inspired evolutionary algorithm for practical application[C] // Proceedings of 2003 IEEE Congress on Evolutionary Computation.Washington,DC:IEEE,2003:178-184.
  • 8覃朝勇,郑建国.一种新量子进化算法及其在函数优化中的应用[J].系统仿真学报,2009,21(10):2862-2865. 被引量:5

二级参考文献26

  • 1陈辉,张家树,张超.实数编码混沌量子遗传算法[J].控制与决策,2005,20(11):1300-1303. 被引量:41
  • 2CHITTUR A. Model generation for an intrusion detection System using genetic algorithms [J/OL]. http://wwwl, cs. col-umbia, edu/ids/publications/gaids-thesis01, pdf, 2005.
  • 3LI Wei. Using Genetic Algorithm for network intrusion detection [ C ]// Proceedings of United States Department of Energy Cyber Security Group 2004 Training Conference. Kansas : [ s. n. ] ,2004:24 - 27.
  • 4PILLAI M M, ELOFF J H P, VENTER H S. An approach to implement a network intrusion detection system using genetic algorithms [ C ]//Proceedings of SAICSIT 2004. [ S. L. ] : South Africa: South African Institute for Computer Scientists and Information Technologists, 2004:221 -228.
  • 5GOMEZ J, DASGUPTA D. Evolving fuzzy classifiers for intrusion detection [ C ]//Proceedings of the 2002 IEEE Workshop on Information Assurance. NY: West Point, 2002 : 68 - 75.
  • 6MIDDLEMISS M, DICK G. Feature selection of intrusion detection data using a hybrid genetic algorithm/ KNN approach [ C]//Design and application of hybrid intelligent systems. The Netherlands:IOS Press Amsterdam, 2003:519-527.
  • 7LU Wei, TRAORE I. Detecting new forms of network intrusion using genetic programming [ J]. Computational Intelligence, 2004, 20 : 475 - 494.
  • 8KDD99. KDD99 cup dataset[ DB/OL]. http://kdd. ics. uci. edu/databases/kddcup99, 1999.
  • 9Narayanan A, Moore M. Quantum-inspired Genetic Algorithm [C]// Proceedings of IEEE International Conference on Evolutionary Computation. Piscataway, USA: IEEE Press, 1996: 61-66.
  • 10Han K H, Kim J H. Genetic Quantum Algorithm and Its Application to Combinatorial Optimization Problems [C]// Proceedings of IEEE Conference on Evolutionary Computation. Piscataway, USA: IEEE Press, 2000: 1354-1360.

共引文献17

同被引文献20

  • 1高为民,徐红云.网络入侵诱控系统的研究与实现[J].计算机测量与控制,2006,14(12):1751-1753. 被引量:3
  • 2杨清,李方敏.移动Ad Hoc网络入侵检测研究[J].计算机工程,2007,33(4):118-120. 被引量:3
  • 3马莉,刘凤玉.一种改进的网络入侵检测器生成算法[J].计算机工程与应用,2007,43(21):150-152. 被引量:4
  • 4牛少影.信息安全概论[M].北京:北京邮电大学出版社,2004:190-201.
  • 5刘运生.计算机网络安全[M].北京:清华大学出版社,2007.
  • 6DARTIQUE C, JANG H, ZENG W. A new data-mining based ap- proach for network intrusion detection[ C]// Proceedings of the 7th Annual Conference on Communication Networks and Services Re- search. Washington, DC: IEEE Computer Society, 2009: 372- 377.
  • 7ZAMAN S, KARRAY F. Lightweight IDS based on features selec- tion and IDS classification scheme[ C]// Proceedings of the 12th In- ternational Conference on Computational Science and Engineering. Washington, DC: IEEE Computer Society, 2009:365-370.
  • 8HANK H, KIM J H. Quantum-inspired evolutionary algorithm for a class of combinatorial optimization [ J]. IEEE Transactions on Evo- lutionary Computation, 2002, 6(6): 580-593.
  • 9LI Y Y, ZHAO J J, JIAO L C. Quantum-inspired evolutionary mul- ticast algorithm[ C]// Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2009:1496 - 1501.
  • 10HANK H, KIM J H. Quantum-inspired evolutionary algorithm with a new termination criterion, H~ gate and two-phase scheme [ J]. IEEE Transactions on Evolutionary Computation, 2004, 8(4): 156 - 169.

引证文献2

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部