期刊文献+

基于SVM和模糊逻辑的告警相关性分析 被引量:3

Alarm correlation analysis based on SVM and fuzzy logic
下载PDF
导出
摘要 针对网络故障诊断中现有告警关联算法存在的网络动态适应性差、关联误报率高等问题,提出了一种基于支持向量机(support vector machine,SVM)和模糊逻辑的告警相关性分析算法。该算法在数据预处理部分采用滑动时间窗、时序模糊以及特征统计的方法解决了网络不确定性和数据格式规范化的问题,并通过SVM训练和识别完成相关性分析。DARPA攻击数据集测试结果表明,该算法误报、漏报率低,压缩率大,网络动态适应性好,提高了告警关联效率。 This paper proposed an alarm correlation algorithm based on support vector machine(SVM) and fuzzy logic to solve the problems of poor dynamic adaptability,high false alarm rate and so on,which were existing in the alarm correlation of network fault diagnosis.For the problems of network uncertainty and nonstandard data formats,sliding time window,fuzzy time series and feature statistics were employed in the data pre-processing part.The alarm correlation part was realized through the training and identificating of SVM.Experiment on DARPA intrusion detection evaluation data set shows that the algorithm has lower false alarm rate,higher compression ratio and better dynamic adaptability,which improve the efficiency of alarm correlation.
出处 《计算机应用研究》 CSCD 北大核心 2011年第2期685-688,共4页 Application Research of Computers
基金 陕西省自然科学基金资助项目(SJ08F14 2009JQ8008)
关键词 网络故障诊断 支持向量机 告警关联 模糊逻辑 network fault diagnosis support vector machine alarm correlation fuzzy logic
  • 相关文献

参考文献6

二级参考文献28

  • 1田志宏,方滨兴,张宏莉.基于半轮询驱动的网络入侵检测单元的设计与实现[J].通信学报,2004,25(7):146-152. 被引量:5
  • 2李辉,韩崇昭,郑庆华,昝鑫.一种基于交互式知识发现的入侵事件关联方法研究[J].计算机研究与发展,2004,41(11):1911-1918. 被引量:6
  • 3彭文灵,王丽娜,张焕国,傅建明.基于角色访问控制的入侵容忍机制研究[J].电子学报,2005,33(1):91-95. 被引量:20
  • 4董晓梅,于戈,孙晶茹,王丽娜.基于频繁模式挖掘的报警关联与分析算法[J].电子学报,2005,33(8):1356-1359. 被引量:6
  • 5Pei J, Han J, Mao R. CLOSET: An efficient algorithm for mining frequent closed itemsets[A]. Proc 2000 ACM-SIGMOD Int. Workshop on Data Mining and Knowledge Discovery (DMKD'00) [C]. New York:ACM Press,2000.21 - 30.
  • 6Han J, Pei J, Yin W. Mining frequent patterns without candidate generation[J]. ACM SIGMOD Record,2000,29(2) : 1 - 12.
  • 7Ning P,Cui Y, Reeves D S. Analyzing intensive intrusion alerts via correlation[ A]. Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection ( RAID 2002) [ EB/OL]. http://infosec.cst. ncsu. edu/puhs/raid-02.pdf, 2002.
  • 8Ning P,Cui Y,Reeves D S. Constructing attack scenarios through correlation of intnision alerts[ A]. Proceedings of the 9th ACM Conference on Computer and Communications Security[EB/OL]. http://infosec.csc. ncsu. edu/pubs/ccs02.pdf, 2002.
  • 9Ning P, Xu D. Adapting query optimization techniques for efficient intrusion alert correlation[A]. Proceecdings of the 17th IFIP WG 11.3 Working Conference on Data and Application Secttrity [ EB/OL ].http://discovery. csc. nesu. edu/- pning/pubs/FastCorrelation. pdf,2003.
  • 10Cupperts F, Miege A. Alert correlation in a cooperative intrusion detection framework[A]. PROC IEEE COMPUT SOC SYMP RES SECUR PR/VACY[C]. Washington, DC: IEEE Computer Society Press,2002.202-215.

共引文献37

同被引文献32

  • 1Moy J. OSPF version 2[EB/OL]. (2012-10-19). ht- tp://www, ietf. org/rfc/rfc2328, txt.
  • 2Alaellinoglu C, Jacobson C, Yu H. Towards millisec- ond IGP convergence[EB/OL]. (2000-11-06). http:// www. nanog, org/meetings/nanog20/abstracts, php? pt = MTA3MiZuYWSvZzlw&nm= nanog20,2000.
  • 3Xu Mingwei, Yang Yuan, Li Qi. Selecting shorter al- ternate paths for tunnel--based IP fast reroute[J]. Computer networks, 2012,56 (2) : 845-857.
  • 4Betker A, Gerlach C, Hulsermann R, et al. Reference transport network scenarios[R]. MultiTeraNet Pro- ject, 2004.
  • 5THANGAVEL M,Dr THANGARAJ P.Cluster based statisticalanomaly intrusion detection for varied attack intensities[J].Interna-tional Journal of Computer Applications,2011,24(9):27-33.
  • 6SHARADA K A,HEMANT,PRASHANTH,et al.A model proposedfor reducing the false positive alarm rate using the feature of eventcorrelation[J].International Journal of Advanced Research inComputer Science and Software Engineering,2012,2(8):103-108.
  • 7AI-MAMORY S 0,ZHANG Hong-li.Intrusion detection alarm reduc-tion using root cause analysis and clustering[J].Journal Of Comput-er Communication,2009,32(2):419-430.
  • 8GADDAM S R,PHOHA V V,BALAGANI K S.K-means + ID3 ; anovel method for supervised anomaly detection by cascading K-meansclustering and ID3 decision tree learning methods[J].IEEE Transon Knowledge and Data Engineering,2007,19(3):345-354.
  • 9PIETRASZEK T.Using adaptive alert classification to reduce falsepositives in intrusion detection[C]//Lecture Hotes in ComputerScience,vol 3224.2004:102-124.
  • 10VIINIKKA J,DEBAR H.Processing instrusion detection alert aggre-gate with time series moding[J].Information Fusion,2009,10(2):312-324.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部