期刊文献+

基于改进的GHSOM的入侵检测研究 被引量:24

Research on intrusion detection based on an improved GHSOM
下载PDF
导出
摘要 提出了一种基于改进的生长型分级自组织映射(GHSOM,growing hierarchical self-organizing maps)神经网络的入侵检测方法。改进的GHSOM具有传统GHSOM多层分级的特点,同时能够处理含有数值类型成员和字符类型成员的混合输入模式向量,提高了入侵检测的效率。对KDD Cup 99数据集和模拟数据集进行的入侵检测模拟实验表明,改进的GHSOM算法对各种类型的攻击有着较高的检测率。 A novel technique based on an improved growing hierarchical self-organizing maps(GHSOM) neural network for intrusion detection was presented.The improved GHSOM could deal with a metric incorporating both numerical and symbolic data,and then improved efficiency of intrusion detection.The validities and feasibilities of the improved GHSOM were confirmed through experiments on KDD Cup 99 datasets and simulated experiment datasets.The experi-ment results showes that the detection rate has been increased by employing the improved GHSOM.
出处 《通信学报》 EI CSCD 北大核心 2011年第1期121-126,共6页 Journal on Communications
基金 国家自然科学基金资助项目(61070237 60873238)~~
关键词 网络安全 入侵检测 神经网络 生长型分级自组织映射 network security intrusion detection neural network GHSOM
  • 相关文献

参考文献9

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2DEPREN O, TOPALLAR M, ANARIM E, et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks[J]. Expert Systems with Applications,2005,29: 713-722.
  • 3RAMADAS M, OSTERMANN M, TJADEN B. Detecting anomalous network traffic with self-organizing maps[A]. Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection[C]. Pittsburgh, PA, USA, 2003.
  • 4RAUBER A, MERKL D, DrFFENBACH M. The growing hierarchical self-organizing map: Exploratory analysis of high-dimensional data[J]. IEEE Transactions on Neural Networks, 2002,13(6): 1331-1341.
  • 5PALOMO E J, DOMINGUEZ E, LUQUE R M, et al. A new GHSOM model applied to network security[J]. Lecture Notes in Computer Science Springer, 2008, 5168: 680-689.
  • 6PALOMO E J, DOMINGUES E, LUQUE R M, et al. An intrusion detection system based on hierarchical self-organization[J]. Journal of Information Assurance and Security4, 2009, 4(3): 209-216.
  • 7FAOUR A, LERAY P, ETER B. Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems[A]. Proceedings of 1st IFIP International Conference on New Technologies, Mobility and Security[C]. Paris, France, 2007.
  • 8Index of / databases/kddcup99 [EB/OL]. http://kdd.ics.uci.edu/data- bases/kddcup99.2009.
  • 9JIANG D B, YANG Y H, XIA M. Research on intrusion detection based on an improved sore neural network[A]. Proceedings of Fifth International Conference on Information Assurance and Security[C]. Xi'an, China, 2009. 400-403.

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献230

同被引文献132

引证文献24

二级引证文献236

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部