期刊文献+

基于Tri-training的入侵检测算法 被引量:2

Intrusion Detection Algorithm Based on Tri-training
下载PDF
导出
摘要 半监督的双协同训练要求划分出的2个数据向量相互独立,不符合真实的网络入侵检测数据特征。为此,提出一种基于三协同训练(Tri-training)的入侵检测算法。使用大量未标记数据,通过3个分类器对检测结果进行循环迭代训练,避免交叉验证。仿真实验表明,在少量样本情况下,该算法的检测准确度比SVM Co-training算法提高了2.1%,并且随着循环次数的增加,其性能优势更加明显。 The Co-training method requires the independence of two data vectors, which is far from the characteristic of real dataset in network intrusion detection. This paper proposes a intrusion detection method based on Tri-training. It exploits the large amount of unlabeled data, and increases the detection accuracy and stability by Co-training three classifiers. Simulation results show that this method is 2.1% more accurate than the SVM Co-training method, and it performs better with the increase of the loop number.
出处 《计算机工程》 CAS CSCD 2012年第6期158-160,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61103015) 湖南省自然科学基金资助项目(09JJ5043)
关键词 入侵检测 小样本 支持向量机 半监督 双协同训练 三协同训练 intrusion detection small-sample Support Vector Machine(SVM) semi-supervised Co-training Tri-training
  • 相关文献

参考文献11

  • 1毛国君,宗东军.基于多维数据流挖掘技术的入侵检测模型与算法[J].计算机研究与发展,2009,46(4):602-609. 被引量:25
  • 2Mukkamala S, Sung A, Abraham A. Identifying Key Variables for Intrusion Detection Using Soft Computing Paradigms[C]//Proc. of FUZZ-IEEE’03. St. Louis, USA: IEEE Press, 2003.
  • 3连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:84
  • 4李昆仑,张伟,代运娜.基于Tri-training的半监督SVM[J].计算机工程与应用,2009,45(22):103-106. 被引量:15
  • 5Gagnon R,Lian Jing,Boutin Y, et al. Seasonal enhancement of IL-4 induced IgE synthesis by peripheral blood mononuclear cells of atopic patients. Clin Exp Allergy, 1993,23:498
  • 6Zhou Zhihua, Li Ming. Tri-training: Exploiting Unlabeled Data Using Three Classifiers[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(11): 1529-1541.
  • 7Blum A, Mitchell T. Combining Labeled and Unlabeled Data with Co-training[C]//Proc. of the 11th Annual Conference on Computational Learning Theory. Madison, USA: [s. n.], 1998.
  • 8Nello C, John S T. 支持向量机导论[M]. 李国正, 王 猛, 曾华军, 译. 北京: 电子工业出版社, 2004.
  • 9邓超,郭茂祖.基于自适应数据剪辑策略的Tri-training算法[J].计算机学报,2007,30(8):1213-1226. 被引量:15
  • 10Kawano Y, Noma T. Dual action of IL-4 on mite antigen - induced IgE synthesis on lymphocytes from individuals with bronchial asthma. Clin Exp Immunol, 1995,102(2) :389 - 394

二级参考文献45

  • 1郑军,胡铭曾,云晓春,郑仲.基于数据流方法的大规模网络异常发现[J].通信学报,2006,27(2):1-8. 被引量:17
  • 2郭山清,谢立,曾英佩.入侵检测在线规则生成模型[J].计算机学报,2006,29(9):1523-1532. 被引量:14
  • 3刘旭,毛国君,孙岳,刘椿年.数据流中频繁闭项集的近似挖掘算法[J].电子学报,2007,35(5):900-905. 被引量:14
  • 4Lee W, Stolfo S J. Data mining approaches for intrusion detection [C] //Proc of the 7th USENIX Security Symposium. Berkeley, USA: USENIX Assoc, 1998: 79-93
  • 5Lee W, Stolfo S J. A framework for constructing features and models for intrusion detection systems [C] //ACM Trans on Information and System Security. New York: ACM Press, 2000:227-261
  • 6EI-Semary A, Edmonds J, Gonzalez Pino J. Applying data mining of fuzzy association rules to network intrusion detection[C] //Proc of 2006 IEEE Information Assurance Workshop. Piscataway, NJ : IEEE, 2006 : 100-107
  • 7Pornoy L. Intrusion detection with unlabeled data using clustering [C] //Proc of ACM CSS Workshop on Data Mining Applied to Security. New York: ACM, 2001
  • 8Zanero S, Sacaresi S M. Unsupervised learning techniques for an intrusion detection system [C]//Proc of the 2004 ACM Symp on Applied Computing. New York: ACM, 2004
  • 9Oh S, Kang J, Byun Y, et al. Intrusion detection based on clustering a data stream [C] //Proc of the 3rd ACIS Int Conf on Software Engineering Research, Management and Applications(SERA'05). Los Alamitos: IEEE Computer Society, 2005:220-227
  • 10Dong G, Han J, Lakshmanan L, et al. Online mining of changes from data streams: research problems and preliminary results [C] //Proc of the 2003 Workshop on Management and Processing of Data Streams (MPDS2003). New York: ACM, 2003:225-236

共引文献134

同被引文献18

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部