期刊文献+

一种网络入侵检测的改进贝叶斯算法

An Improved Bayesian Algorithm For Anomaly Intrusion Detection
下载PDF
导出
摘要 入侵检测技术越来越受到人们的关注。提出了一种用于入侵检测中警报分类的改进自适应贝叶斯算法,该算法减少了入侵检测中的积极错误。通过对标准数据测试集KDD99进行实验,证明了此方法在短应答时间里拥有极高的分类效率,而且只需要极少的计算资源来减少积极错误。 Intrusion Detection has received more and more attention.Proposed a improved self adaptive Bayesian algorithm to the alert classification and reduce false positives in Intrusion Detection.By the experiment on KDD99 benchmark dataset,it is proved that this method has high classification rates in short response time and reduce false positives using limited computational resources.
作者 张娟 曾茂林
出处 《软件》 2011年第3期113-115,120,共4页 Software
关键词 异常入侵检测 报警分类 贝叶斯算法 积极错误 anomaly intrusion detection alert classification Bayesian algorithm false positives
  • 相关文献

参考文献9

二级参考文献22

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2李凯,黄厚宽.小规模数据集的神经网络集成算法研究[J].计算机研究与发展,2006,43(7):1161-1166. 被引量:10
  • 3[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 4[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 5[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 6[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 7[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 8[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 9HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 10Jonatan Gomez C, Fabio Gonzalez. An immuno-fuzzy approach to anomaly detection [C]. IEEE International Conference on Fuzzy System, 2003.1219-1224.

共引文献200

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部