期刊文献+

核化空间深度包围核的模糊决策异常检测算法

Fuzzy Decision Outlier Detection Algorithm of Kernelized Spatial Depth Sphere
下载PDF
导出
摘要 根据核化空间深度异常检测算法中适用性的局限性和最小包围核算法中存在参数影响检测效率的缺点,在引入模糊决策思想下,提出一种将上述2种算法相结合的模糊决策异常检测算法。融合后的算法将2种算法的优势相结合,并用模糊决策方法提高算法的稳定性和适用性。通过在人工数据集和UCI数据集上的实验结果表明,该算法具有较好的异常检测效果。 This paper proposes a new idea using the idea of the fuzzy decision.And it is based on the kernelized spatial depth and the idea of the smallest sphere,intending for the problems that kernelized spatial depth function can not have good performance on some datasets and the parameters have the influence on the effectiveness.In this way,the algorithm improves the effectiveness and robustness in outlier detection by using the advantages of the algorithm and weakening the disadvantages.This paper does some experiments on the two artificial datasets and three different UCI datasets.Results show the effectiveness of the proposed idea.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第14期18-20,26,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60773206)
关键词 核化空间深度 最小包围核 核函数 异常检测 模糊决策 kernelized spatial depth; smallest sphere; kernelized function; outlier detection; fuzzy decision
  • 相关文献

参考文献9

二级参考文献31

  • 1林果园,郭山清,黄皓,曹天杰.基于动态行为和特征模式的异常检测模型[J].计算机学报,2006,29(9):1553-1560. 被引量:25
  • 2陈鸣钊 张志烈.模糊数学及其实用[M].南京:河海大学出版社,1993.176-178.
  • 3Forrest S, Hofmeyr S A, Somayaji A, et al. A Sense of Self for Unix Processes[C]//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, California:[s. n.], 1996.
  • 4Wespi A, Dacier M. Intrusion Detection Using Variable-length Audit Trail Pattems[C]//Proc. of the 3rd International Workshop on the Recent Advances in Intrusion Detection. Toulouse, France: [s. n.], 2000.
  • 5Ye Nong. A Markov Chain Model of Temporal Behavior for Anomaly Detecfion[C]//Proc. of IEEE Workshop on Information Assurance and Security. [S. l.]: IEEE Press, 2000.
  • 6Yan Qiao, Xie Weixin, Yang Bin, et al. Anomaly Intrusion Detection Method Based on HMM[J]. Electronics Letters, 2002, 38(13): 663-664.
  • 7Hofmeyr S A, Forrest S, Somayaji A. Intrusion Detection Using Sequence of System Calls[J]. Journal of Computer Security, 1998, 6(3): 151-180.
  • 8CHANG R K C. Defending against flooding-based distributed denial- of-service attack: a tutorial [J]. IEEE Communications Magazine, 2002, 40(10): 42-51.
  • 9MUKKAMALA S, JANOSKI G, SUNG H. Intrusion detection using neural networks and support vector machines [ C ]//Proc of International Joint Conference. New Jersey: IEEE Computer Society Press, 2002.
  • 10SUNG A. Ranking importance of input parameters of neural networks [ J ]. Expert Systems with Applications, 1998, 15 (3) :405-411.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部