期刊文献+

粒子群算法网络异常检测技术研究 被引量:4

Particle Swarm Algorithm for Network Anomaly Detection Technology Research
下载PDF
导出
摘要 提出了一种新的基于粒子群算法入侵检测方法模型。算法采用粒子群优化算法,有效地降低网络拓扑路径长度,通过优化算法来寻找聚类的中心。实验结果表明,提出的改进算法与传统的入侵检测算法相比,具有更好的入侵识别率和检测率。 This paper presents a new intrusion detection method based on particle swarm optimization model. Algorithm using particle swarm optimization algorithm, effectively reduce the network topological path length, the optimization algorithm to find the clustering center. The experimental results show that the proposed algorithm, and the traditional intru- sion detection algorithm, has better intrusion recognition rate and detection rate
作者 赵菲
出处 《科技通报》 北大核心 2012年第4期128-129,158,共3页 Bulletin of Science and Technology
关键词 网络异常 粒子群算法 网络安全 入侵检测 network anomaly particle swarm algorithm network security intrusion detection
  • 相关文献

参考文献2

  • 1Sad S, Mosmann TR. Single IL-2-Secreting Precursor CD4 T Cell Can Develop in to Either Th1 or Th2 Cytokine Secretion Phenotype.J Immunol, 1994,153:3514 - 3519
  • 2薛潇,刘以安,魏敏.一种入侵检测的分类方法研究[J].计算机工程与应用,2010,46(30):98-100. 被引量:7

二级参考文献8

  • 1罗作民,李悦,孙淑海,周红芳.基于Excel及数据转换服务的异构数据集成方法[J].计算机应用,2007,27(3):574-576. 被引量:5
  • 2Bykova M,Ostermann S,Tjaden B.Detecting network intrusions via a statistical analysis of network packet characteristics[C]//Proceedings of the 33rd Southeastern Symposium on System Theory,March 2001 : 309-314.
  • 3Khoshgoflaar T M,Nath S V, Shi Zhong,et al.Intrusion detection in wireless networks using clustering techniques with expert analysis[C]//Proceedings Fourth Intemational Conference on Machine Leaming and Applications, Dec 2005 : 6.
  • 4Han S J, Cho S B.Evolutionary neural networks for anomaly detection based on the behavior of a program[J].IEEE Transactions on Systems,Man, and Cybernetics,Part B, 2005 : 559-570.
  • 5Niimi Y.Emotional robot world[M].Tokyo:Talk and Speak Press, 1995 : 67-96.
  • 6Hasegawa T,Yamaji K,Hatano M,et al.Development of insulation structure and enhancement of insulation reliability of 500 kV DC GIS[J].IEEE Trans on Power Delivery, 1997,12(1 ) : 194-202.
  • 7Sakai K,Tsuru S,Abella D L, an particle-initiated breakdown et al.Conducting particle motion in dc electric field between diverging conducting plates in atmospheric air[J].IEEE Trans on Dielectrics and Electrical Insulation, 1999,6( 1 ) : 122-130.
  • 8李静燕.入侵检测系统及其研究进展[J].网络安全技术与应用,2008(3):32-34. 被引量:6

共引文献8

同被引文献37

  • 1唐正军,李建华.入侵检测技术[M].北京:清华大学出版社,2008.
  • 2Wen-Chung Shih.Performance-based data distribution fordata mining applications on grid computing environments[J].Journal of supercomputing,2010,52(2):92-93.
  • 3Schaefer,G.Data Mining of Gene Expression Data byFuzzy and Hybrid Fuzzy Methods[J].IEEE transactions oninformation technology in biomedicine,2010,14(1):164-165.
  • 4Chen,MC.Information granulation based data mining ap-proach for classifying imbalanced data[J].InformationSciences,2008,178(16):38-41.
  • 5De P, Liu Y, Das S K. Deploymen-aware modeling of node compromise spread in wireless sensor networks using epi- demic theory[J]. ACM Transactions on Sensor Networks, 2009,5(3) :413-425.
  • 6Palomo E J, Domingues E, Luque R M, et al. An intrusion de- tection system based on hierarchical self-organization [J].Journal of Information Assurance and security, 2009.4 (3) : 209-216.
  • 7Palomo E J, Dominguez E, Luque R M, et al. A new Ghsom model applied to network security [J]. Lecture Notes in Computer Science Springer, 2008,5168 : 680-689.
  • 8MIT Lincoln Laboratiry. DARPA Instrusion Detection Date Sets[DB/OL]. [2013-10-20]. http://www. 11. mit. edu/ mission/communieations/cyber/CSTcorpora/ideval/data/ index, html.
  • 9Wang Li, Liu J, Hu J T, et al. Efficient task assignment on het erogeneous multicore systems considering communication over head [A]. Proc of the 12'h International Conference on Algorithms and Architectures for Parallel Processing, Berlin: Springer-Ver Iag, 2012:171-185.
  • 10Mei J, Li K L, Hu J T, et al. Energy-aware preemptive sched uling algorithm for sporadic tasks on DVS platform [J], Micro- processors and Microsystems, 2013, 37 (1): 99-114.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部