期刊文献+

基于GPU和特征选择的SVM入侵检测模型 被引量:3

SVM Intrusion Detection Model Based on GPU and Feature Selection
下载PDF
导出
摘要 基于支持向量机的入侵检测模型检测效率较低,为此,提出一种基于图形处理器(GPU)和特征选择的入侵检测模型。在入侵检测过程中,采用基于GPU的并行计算模型进行训练,并对样本的特征进行合理选择,从而提高检测效率。实验结果表明,在保证系统性能的情况下,该模型可以缩短训练时间。 In order to optimize test efficiency of Intrusion Detection System(IDS) based on Support Vector Machine(SVM), a new intrusion detection method based on Graphics Processing Unit(GPU) and feature selection is proposed. During the process of intrusion detection, GPU-based parallel computing model is adopted and features of samples are reasonable selected. Experimental results demonstrate that the proposed method can reduce time consumption in the training procedure of IDS and the performance for intrusion detection is kept as usual.
出处 《计算机工程》 CAS CSCD 2012年第8期111-113,116,共4页 Computer Engineering
基金 上海市教委科研创新基金资助项目(09YZ370) 上海工程技术大学科技发展基金资助项目(2011XY16)
关键词 入侵检测 支持向量机 图形处理器 统一计算设备架构 特征选择 并行计算 intrusion detection Support Vector Machine(SVM) Graphics Processing Unit(GPU) Compute Unified Device Architecmre(CUDA) feature selection parallel computing
  • 相关文献

参考文献4

  • 1Vapnik V N.The Nature of Statistical Learning Theory[M].New York,USA:Springer,1995.
  • 2Chang Chih-Chung,Lin Chih-Jen.LIBSVM:A Library for Sup-port Vector Machines[EB/OL].(2011-06-01).http://www.csie.ntu.edu.tw/~cjlin/libsvm/pdf.
  • 3史志才,夏永祥.基于知识约简的网络入侵特征提取[J].计算机工程,2011,37(5):134-136. 被引量:5
  • 4KDD Cup 1999 Data[EB/OL].(1999-10-28).http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

二级参考文献6

共引文献4

同被引文献30

  • 1卢辉斌,徐刚.一种新的基于数据挖掘的入侵检测方法[J].微处理机,2006,27(4):58-60. 被引量:4
  • 2罗敏,阴晓光,张焕国,王丽娜.基于孤立点检测的入侵检测方法研究[J].计算机工程与应用,2007,43(13):146-149. 被引量:6
  • 3赵晓峰,叶震.基于加权多随机决策树的入侵检测模型[J].计算机应用,2007,27(5):1041-1043. 被引量:6
  • 4陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 5Li Hanguang, Ni Yu. Intrusion detection technology research based on apriori algorithm [ C]//Proc of 2012 international conference on applied physics and industrial engineering. Hong Kong: [ s. n. ] ,2012 : 1615-1620.
  • 6Wu Suyun, Yen E. Data mining-based intrusion detectors [ J ]. Expert Systems with Applications ,2009,36 ( 3 ) :5605-5612.
  • 7Kamal A H M, Zhu Xingquan, Pandya A, et al. Feature Selec- tion with biased sample distributions [ C ]//Proceedings of the IEEE international conference on information reuse and inte- gration. Las Vegas, NV : IEEE ,2009:23-28.
  • 8Kamal A H M, Zhu Xingquan, Pandya A S, et al. Feature se- lection for datasets with imbalanced class distributions [ J ]. In- ternational Journal of Software Engineering and Knowledge Engineering,2010,20 (2) :113-137.
  • 9Tsai Chih-Fong, Hsu Yu-Feng, Lin Chia-Ying, et aL Intru- sion detection by machine learning: a review [ J ]. Expert Sys- tems with Applications ,2009,36 (10) : 11994-12000.
  • 10黄斌,史亮,姜青山,吴楠楠.基于孤立点挖掘的入侵检测技术[J].计算机工程,2008,34(3):88-90. 被引量:11

引证文献3

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部