期刊文献+

用于网络入侵检测的VFSA-C4.5特征选择算法 被引量:3

VFSA-CA. 5 feature selection algorithm for network intrusion detection
下载PDF
导出
摘要 提出了一种新的用于网络入侵检测的特征选择算法——VFSA.C4.5算法。该算法采用快速模拟退火(VFSA)搜索策略对特征子集空间进行随机搜索,然后利用提供的数据在C4.5决策树上的分类错误率作为特征子集的评估标准来为入侵检测获取最优特征子集。在著名的KDD1999入侵检测数据集上进行了大量的实验,结果表明该算法相对于其它一些应用于入侵检测的特征选择算法,在保证较高检测率的前提下,可有效地降低误报率、入侵检测的计算复杂度和提高检测速度,能更适用于现实高速网络应用环境。 The VFSA-C4.5 a new feature selection algorithm is proposed to detect network intrusions. The algorithm uses the very fast simulated annealing (VFSA) as the search strategy to specify a candidate subset for evaluation, and then uses the decision tree of C4.5 as the evaluation function to obtain the optimum feature subset for intrusion de- tection by the data classification error rate. The feasibility of the feature selection algorithm was examined by con- ducting several experiments on the KDD 1999 intrusion detection dataset. The experimental results show that the VFSA-C4.5 algorithm has higher detection rate and lower false alarm rate compared with other feature selection algorithms for network intrusion detection. Furthermore, the proposed algorithm can reduce computational resources of intrusion detection, improve the detection speed and is more suitable for the real network applications than the traditional ones.
出处 《高技术通讯》 CAS CSCD 北大核心 2011年第12期1240-1245,共6页 Chinese High Technology Letters
基金 863计划(2007AA012416)和973计划(2007CB311100)资助项目.
关键词 网络入侵检测 特征选择 快速模拟退火(VFSA) 决策树 network intrusion detection, feature selection, very fast simulated annealing (VFSA) , decision tree
  • 相关文献

参考文献18

  • 1Zaman S, Karray F. Lightweight IDS based on features selection and IDS classification scheme. In: Proceedings of the 12th IEEE International Conference on Computa- tional Science and Engineering, Vancouver, Canada, 2009. 365-370.
  • 2Jain A, Zongker D. Feature selection: Evaluation, appli- cation, and small sample performance. IEEE Transac- tions on Pattern Analysis and Machine Intelligence, 1997, 19(2) : 153-158.
  • 3Kudo M, Sklansky J. Comparison of algorithms that select features for pattern classifiers. Pattern Recognition, 2000, 33(1): 25-41.
  • 4Grandvalet Y, Canu S. Adaptive scaling for feature selec- tion in SVMs. Advances in Neural Information Processing Systems, 2003,15:553-560.
  • 5Arribas J I, Cid-Sueiro J. A model selection algorithm for a posteriori probability estimation with neural networks. IEEE Transactions on Neural Networks, 2005,16 (4) : 799 -809.
  • 6Mao K. Feature subset selection for support vector ma- chines through discriminative function pruning analysis. IEEE Transactions on Systems, Man, and Cybernetics, 2004,34( 1 ) :60-67.
  • 7Kim D, Nguyen H N, Ohn S Y. Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. Ad- vances in Neural Networks. Lecture Notes in Computer Science, New York : Springer-Verlag, 2005,3498 : 415 - 420.
  • 8Shazzad K M, Jong S P. Optimization of intrusion detec- tion through fast Hybrid feature selection. In: Proceed- ings of the 6th International Conference on Parallel and Distributed Computing, Applications and Technologies, Washington, DC, USA, 2005. 264-267.
  • 9Chen Y, Dai L, Li Y, et al. Building efficient intrusion detection model based on principal component analysis and C4.5 algorithm. In : Proceedings of the 9th IEEE In- ternational Conference on Advanced Communication Tech- nology, Guilin, China, 2006. 2109-2112.
  • 10Cherkassky V. The nature of statistical learning theory IEEE Transactions on Neural Networks, 1997 ,8 (6) 1564-1566.

二级参考文献15

  • 1唐焕文,张立卫,王雪华.一类约束不可微优化问题的极大熵方法[J].计算数学,1993,15(3):268-275. 被引量:75
  • 2唐焕文,张立卫.凸规划的极大熵方法[J].科学通报,1994,39(8):682-684. 被引量:49
  • 3李兴斯.一类不可微优化问题的有效解法[J].中国科学(A辑),1994,24(4):371-377. 被引量:137
  • 4陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 5Yu L, Liu H. Feature selection for high-dimensional data: a fast correlation-based filter solution. In: Proceedings of the 20th International Conference on Machine Learning, Washington DC, USA, 2003. 856-863.
  • 6Williams N, Zander S, Annitage G. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Compater Communication Review, 2006, 135(5):5-16.
  • 7Moore A W, Zuev D. Internet traffic classification using bayesian analysis techniques. In: Proceedings of the ACM SIGMETRICS, Banff, Canada, 2005. 50-60.
  • 8Zander S, Nguyen T, Armitage G. Automated traffic classification and application identification using machine learning. In : Proceedings of the IEEE LCN, Melbourne, Australia, 2005. 250-257.
  • 9Skalak D B. Prototype and feature selection by samphng and random mutation hill climbing algorithms. In: Proceedings of the 11th International Conference on Machine Learning, New Brunswick, NJ, Canada, 1994. 293-301.
  • 10Vapnik V. The Nature of Statistical Leaming Theory. New York: Springer Verlag, 1995.17-23.

同被引文献32

  • 1DARTIQUE C, JANG H, ZENG W. A new data-mining based ap- proach for network intrusion detection[ C]// Proceedings of the 7th Annual Conference on Communication Networks and Services Re- search. Washington, DC: IEEE Computer Society, 2009: 372- 377.
  • 2ZAMAN S, KARRAY F. Lightweight IDS based on features selec- tion and IDS classification scheme[ C]// Proceedings of the 12th In- ternational Conference on Computational Science and Engineering. Washington, DC: IEEE Computer Society, 2009:365-370.
  • 3HANK H, KIM J H. Quantum-inspired evolutionary algorithm for a class of combinatorial optimization [ J]. IEEE Transactions on Evo- lutionary Computation, 2002, 6(6): 580-593.
  • 4LI Y Y, ZHAO J J, JIAO L C. Quantum-inspired evolutionary mul- ticast algorithm[ C]// Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2009:1496 - 1501.
  • 5HANK H, KIM J H. Quantum-inspired evolutionary algorithm with a new termination criterion, H~ gate and two-phase scheme [ J]. IEEE Transactions on Evolutionary Computation, 2004, 8(4): 156 - 169.
  • 6University of California, Irvine. KDD cup 1999 data[ DB/OL]. [211 -07 -20]. http://kdd, ics. uci. edu/databases/kdd- cup99/kddcup99, html.
  • 7Patel R, Thakkar A, Uanatra A. A survey and comparative analysis of data mining techniques for network intrusion detection systems. International Journal of Soft Computing Engineering, 2012, 2(1): 78-85.
  • 8Dong Y, Qi B, Zhu W, et al. A new intrusion detection model based on data mining and neural network. Przeglad Elektrotechniczny, 2013, 89(1b): 88-90.
  • 9Denning DE. An intrusion detection model. IEEE Trans. on Software Engineering, 2010, 13(2): 222-232.
  • 10Pan W, Shen XT, Liu BH. Cluster analysis unsupervised learning via supervised learning with a non convex penalty. Journal of Machine Learning Research, 2013: 1865-1889.

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部