期刊文献+

改进支持向量机在网络入侵检测中的应用 被引量:4

Application of Improved Support Vector Machines in Network Intrusion Detection
下载PDF
导出
摘要 为提高网络安全性,提出一种改进支持向量机的网络入侵检测算法.首先采用核主成分分析提取网络数据重要特征,加快网络入侵检测速度,然后采用粒子群算法对支持向量机参数进行优化,提高网络检测正确率.仿真实验结果表明,改进支持向量提高网络入侵检测正确率,降低漏检率,同时加快了网络入侵检测速度,是一种有效、实时性较强的网络入侵检测算法. In order to improve the security of the network,this paper proposes an improved support vector machine algorithm for network intrusion detection.Firstly,kernel principal component analysis is used to extract data network feature,accelerate the network intrusion detection rate,then the particle swarm optimization algorithm is used to optimize the support vector machine parameters,improve the network detection accuracy rate.The simulation results show that,the proposed method has improved network intrusion detection rate,reduce the failure rate,and speed the network intrusion detection,it is an efficient,real-time network intrusion detection algorithm.
作者 于静 王辉
出处 《微电子学与计算机》 CSCD 北大核心 2012年第3期10-13,共4页 Microelectronics & Computer
关键词 粒子群优化算法 核主成分分析 支持向量机 入侵检测 particle swarm optimization PCA support vector machines intrusion detection
  • 相关文献

参考文献7

二级参考文献24

  • 1周晔,杨天奇.一种基于置信度的异常检测模型与设计[J].计算机仿真,2005,22(1):167-169. 被引量:6
  • 2喻昕,邓文达,彭久生.粗糙集理论在处理不完全信息的应用[J].计算机工程与科学,2005,27(10):65-68. 被引量:3
  • 3田有文,王文涛,王思宇.基于BP神经网络的农村用电量预测的研究[J].沈阳农业大学学报,2005,36(4):506-507. 被引量:4
  • 4顾梅,徐涛.基于ASM的彩色视频中运动物体的定位[J].计算机应用,2007,27(1):234-236. 被引量:6
  • 5常卫东,王正华,鄢喜爱.基于集成神经网络入侵检测系统的研究与实现[J].计算机仿真,2007,24(3):134-137. 被引量:29
  • 6[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 7[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 8[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 9[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 10[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.

共引文献256

同被引文献18

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部