期刊文献+

改进的支持向量机无线网络安全检测算法模型 被引量:4

Improved Support Vector Machine Wireless Network Security Detection Algorithm Model
下载PDF
导出
摘要 针对传统网络入侵算法在WLAN中的异常检测效率低,提出了一种SVM算法的WLAN入侵检测方法,首先对网络入侵的数据计算信息增益,从原始数据中选取对分类结果影响较大的特征属性,对SVM参数进行优化,最后采用优化的SVM算法对无线网络数据进行检测,得出网络入侵结果。实验结果表明,提出的算法检测正确率高、漏报率与误报率低,具有很好的应用前景。 This paper proposed a support vector machine SVM algorithm for WLAN intrusion detection, first calculates the information gain of network intrusion data, and selects the characteristics of properties having a greater impact on the classification from the raw data to optimize the parameters of SVM, Finally, an optimized SVM algorithm is used to detect the wireless network data to obtain the behavior of network detection. Simulation results show that model of SVM-based WLAN intrusion detection has a high correct detecting rate, a low negative rate and wrong alarm rate.
作者 黄小龙
出处 《科技通报》 北大核心 2012年第2期49-51,共3页 Bulletin of Science and Technology
基金 广西教育厅科研项目(201010LX498) 广州大学--百色学院合作科学研究项目(GBK2010010)
关键词 支持向量机 WLAN 信息增益 入侵检测 SVM WEAN information gain Intrusion detection
  • 相关文献

参考文献6

二级参考文献52

  • 1李红莲,王春花,袁保宗,朱占辉.针对大规模训练集的支持向量机的学习策略[J].计算机学报,2004,27(5):715-719. 被引量:53
  • 2杜建国,郭巧.协议分析和命令解析在入侵检测中的应用[J].计算机工程与应用,2004,40(18):159-162. 被引量:13
  • 3BRAWN S K,KOA R M,CAYE K.Secure in an insecure world:802.1X secure wireless computer connectivity for students,faculty,and staff to the camp-us network[C] // Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services.New York,USA,ACM,2004:273-277.
  • 4CROW B P,WIDJAJA I,KIM J G,et al.IEEE 802.11 wireless local area networks[J].IEEE Communications Magazine,1997,35(9).116-126.
  • 5JEFFREET,CONGDON P,SALA D,et al.P802.1X/D11-2001 IEEE standard for local and metropolitan area networks:standard for portbase network access control[S].Piscataway,NJ,USA:IEEE,2001.
  • 6ABOBA B,BLUNK L,VOLLBRECHT J,et al.RFC 3748-2004 Extensible authentication protocol (EAP)[S].Piscataway,NJ,USA:IETF,2004.
  • 7MISHRA A,ARBAUGH W A.An initial security analysis of the IEEE 802.1X standard[R].Maryland,USA; University of Maryland.Department of Computer Science,2002.
  • 8HWANG H,GYEOK J,SOHN K,et al.A study on M1TM (man in the middle) vulnerability in wireless network using 802.1X and EAP[C]//Proceedings of the 2008 International Conference on Information Sci-ence and Security.Los Alamitos,CA,USA:IEEE Computer Society,2008:164-170.
  • 9MCFALL R,DERSHEM H L.Finite state machine simulation in an introductory lab[C]//25th SIGCSE Technical Symposium on Computer Science Education.New York:USA:ACM,1994:126-130.
  • 10Microsoft Corporation.Protected extensible authentication protocol (PEAP) specifi-cation[EB/OL].[2009-07-27].http://msdn.microsoft.com/en-us/li-brary/cc238354(PROT.13).aspx.

共引文献19

同被引文献34

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部