期刊文献+

基于PCA与FCM的入侵检测样本数据压缩方法 被引量:2

A compression approach to intrusion detection of sample data according to PCA and FCM
下载PDF
导出
摘要 采用行列双向压缩的数据处理策略,提出了一种基于主成分分析与模糊C-均值聚类算法的入侵检测样本数据压缩方法。该方法首先采用主成分分析法对数据冗余特征进行压缩,然后采用模糊C-均值聚类算法对冗余样本进行压缩,由此可挖掘入侵检测样本数据中的关键特征和关键样本。通过KDD CUP99数据集测试证明:数据双向压缩可减少入侵检测分类器的计算量,进而可提高其实时检测性能和检测推断的准确性。 Using the processing principle of dual-directional data compression, this paper presents a compression approach to the intrusion detection of sample data according to PCA and FCM to enhance the effectiveness and accuracy of intrusion detection. Firstly, PCA is used to remove the redundant features. Then, FCM is adopted to eliminate the redundant instances to discover the key features and instances from the intrusion detection sample data. Finally, an illustrative experiment on KDD CUP99 data test set is made to show that the method of dual data compression can reduce the number of train- ing classifiers and the computation of intrusion detection and further improve the efficiency of real time detection and the accuracy of intrusion detection.
出处 《海军工程大学学报》 CAS 北大核心 2012年第5期25-30,共6页 Journal of Naval University of Engineering
基金 国家自然科学基金资助项目(61100042 71171198)
关键词 入侵检测 主成分分析法 模糊C-均值算法 intrusion detection principal component analysis fuzzy C-means algorithm
  • 相关文献

参考文献4

二级参考文献23

  • 1樊友平,陈允平,孙婉胜,马笑潇,柴毅,黄席樾.基于主元分析和免疫聚类的双向特征数据压缩方法[J].系统仿真学报,2005,17(1):148-153. 被引量:7
  • 2胡瑞飞,殷国富,谭颖.一种混合聚类算法及其应用[J].四川大学学报(工程科学版),2006,38(5):156-161. 被引量:2
  • 3俞研,郭山清,黄皓.基于数据流的异常入侵检测[J].计算机科学,2007,34(5):66-71. 被引量:11
  • 4Berkhin P.A survey of clustering data mining techniques[R].Berlin:Springer Heidelberg,2006.
  • 5Johannes Grabmeier,Andreas Rudolph.Techniques of cluster algorithms in data mining[J].Data Mining and Knowledge Discovery J,2002,6(4):303-360.
  • 6Ralambondrainy H.A conceptual version of the k-means algorithm[J].Pattern Recognition Letters,1995,16 (11):1147-1157.
  • 7Hui Wang,Werner Dubitzky.A flexible and robust similarity measure based on contextual probability[C].Int Joint Conf on Artificial Intelligence,2005:27-34.
  • 8Ma Shuai,Wang T J,Tang S W,et al.A fast clustering algorithm based on reference and density[J].J of Software,2003,14(6):1089-1095.
  • 9Jiang Shengyi,Song Xiaoyu,Wang Hui,et al.A clustering-based method for unsupervised intrusion detections[J].Pattern Recognition Letters,2006,27 (7):802-810.
  • 10Steinbach M,Karypis G,Kumar V.A comparison of document clustering techniques[C].Proc of the 6th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining.Boston,2000:1023-1030.

共引文献26

同被引文献26

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部