期刊文献+

基于PCA与R-连续位匹配的亲和力改进算法

IMPROVED AFFINITY ALGORITHM BASED ON PCA AND R-CONTIGUOUS BIT MATCHING
下载PDF
导出
摘要 人工免疫算法中传统亲和力计算方法一般采用r-连续位匹配规则,但这种匹配规则不能有效识别已知入侵的变种,且编码长度直接影响入侵检测的效率。为提高检测率,在PCA特征提取的基础上,采用分段加权的思想改进亲和力算法。实验结果表明,改进的亲和力算法能有效提高入侵检测的检测率。 Traditional affinity calculation method in artificial immune algorithm usually uses r-contiguous bit matching rules,but it can not effectively identify the variants of the known intrusions,and the encoding length directly impacts the efficiency of intrusion detection.In order to enhance the detection efficiency,in this paper we use PCA to extract invasion features and then improve affinity algorithm with the idea of sub-weighted.Experimental results show that the improved algorithm can effectively raise intrusion detection efficiency.
出处 《计算机应用与软件》 CSCD 2010年第11期270-271,293,共3页 Computer Applications and Software
关键词 亲和力算法 r-连续位匹配规则 PCA 入侵检测 Affinity algorithm R-contiguous bit matching rules Principal component analysis(PCA) Intrusion detection
  • 相关文献

参考文献4

二级参考文献15

  • 1谷雨,郑锦辉,孙剑,徐宗本.基于独立成分分析和支持向量机的入侵检测方法[J].西安交通大学学报,2005,39(8):876-879. 被引量:7
  • 2Elsevier Computer Science Editorial.Intrusion detec-tion[J].Information Fusion,2003,(4):243-245.
  • 3Tzafestas E S,Nikolaidou A,Tzafestas S G.Perfo-rmance evaluation and dynamic node generation criteria for‘principal component analysis'neural networks[J].Mathematics and Computers in Simulation,2000,(51):145-156.
  • 4Kdd Cup_Dataset[EB/OL].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,2004.
  • 5Richard Lippmann,Joshua W Haines,David J Fried,et al.The 1999 DARPA online intrusion detection evaluation[J].Computer Networks,2000,(34):579-595.
  • 6Z.H.Zhou.J.X.Wu.W.Tang.Ensembling neural networks:Many could be better than all? Artificial Intelligence,2002,137 (1/2):239~263
  • 7Y.Liu,X.Yao.Ensemble learning via negative correlation.Neural Networks,1999,12(10):1399~1404
  • 8C.L.Blake,C.J.Merz.UCI repository of machine learning databases.http:// kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,1998
  • 9E.Biermann,E.Cloete,L.M.Venter.A comparison of intrusion detection systems.Computers and Security,2001,20 (8):676~683
  • 10T.Verwoerd,R.Hunt.Intrusion detection techniques and approaches.Computer Communications,2002,25 (15):1356 ~1365

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部