期刊文献+

基于商空间粒度聚类的异常入侵检测 被引量:2

ANOMALY INTRUSION DETECTION BASED ON QUOTIENT SPACE GRANULARITY CLUSTERING
下载PDF
导出
摘要 针对异常入侵检测技术中传统聚类方法需要被检测类大小均衡的问题,在商空间粒度理论的基础上,论述了商空间粒度变换可以使复杂问题在不同的粒度世界求解,最终使整个问题得到简化。分析了商空间划分与聚类操作的相似性,提出了基于商空间的粒度聚类方法。将该方法与入侵检测技术相结合,构建了基于商空间粒度聚类的入侵检测系统,用于对KDD CUP 1999数据集的异常入侵检测,实验结果表明该入侵检测系统的性能明显优于基于传统聚类方法的入侵检测系统,从而证明了该方法的正确性和有效性。 In view of the equilibrium detection class issue that traditional clustering methods requires in anomaly intrusion detection technology,we argue in this paper based on the quotient space granularity theory that the quotient space granularity transformation is able to solve complex problem in different granularity world,which at last results in simplifying the whole problem.Then we analyze the similarity of the quotient space division and the clustering operation and put forward the method of granularity clustering based on quotient space.Moreover,by combining the method with intrusion detection technology,we establish the intrusion detection system which is based on quotient space granularity clustering and used for anomaly detection of the KDD CUP 1999 data sets.Experimental results show that the intrusion detection system evidently outperforms other systems based on traditional clustering method.All these prove the correctness and effectiveness of the method.
作者 王丽芳 韩燮
出处 《计算机应用与软件》 CSCD 2011年第1期127-129,156,共4页 Computer Applications and Software
基金 山西省自然科学基金项目(2007011042) 中北大学青年科学基金项目(2008)
关键词 商空间 粒度计算 聚类 异常入侵检测 Quotient space Granularity computing Clustering Anomaly intrusion detection
  • 相关文献

参考文献8

  • 1Portnoy 1, Esk N E, Stolfo S J. Intrusion detection with unlabeled data using clustering[ C ]//Proceedings of ACM CSS workshop on data mining applied to security. New York, NY, USA:ACM,2001.
  • 2Ch M Phlee W, Abdullah A H, Noor md Sapm, et al. Integrating genetic algorithms and fuzzy c-means for anomaly detection [ J ]. Annual IEEE NDICON. Washington, DC :IEEE, 2005:575 - 576.
  • 3Krishnapuram R, Keller Jm. A possibitistic approach to clustering [ J ]. IEEE Transaction on Fuzzy system, 2003,1 (2) 87 - 88.
  • 4王珏,苗夺谦,周育健.关于Rough Set理论与应用的综述[J].模式识别与人工智能,1996,9(4):337-344. 被引量:264
  • 5Lazarevic A, Ertoz L, Kumar V, et al. A comparative study of anomaly detection schemes in network intrusion detection [ C]//Proc. The 3nd SIAM Int'l Conf. Data Mining,2003.
  • 6William Stallings. High-speed networks and Internets: performance and quality of service [ M ]. 2nd ed. Prentice-Hall, NJ,2002 : 148 - 152.
  • 7The third international knowledge discovery and data mining tools competition dataset [ DB/OL].[ 1999 - 10 -28 ]. http://kdd, ics. uci. edu/databases/kddcup99/kddcup99, html.
  • 8Portnoy L, Eskin E, Stolfo S J. Intrusion detection with unlabeled data using clustering[ C ]//Proc. ACM CSS Workshop on Data Mining Applied to Security. Philadelphia, PA, ACM Press,2001,11:5 - 8.

二级参考文献1

  • 1Zdzis?aw Pawlak. Rough sets[J] 1982,International Journal of Computer & Information Sciences(5):341~356

共引文献263

同被引文献22

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部