期刊文献+

基于PCA和半监督聚类的入侵检测算法研究 被引量:10

Research on intrusion detection algorithm based on PCA and semi-supervised clustering
原文传递
导出
摘要 针对网络入侵检测数据存在大量冗余信息和传统聚类算法对离群点检测不足的问题,提出一种基于主成分分析(principal component analysis,PCA)和半监督聚类的入侵检测算法。首先使用PCA对数据进行特征提取,消除数据间的冗余属性;然后利用少量已标记样本和成对约束信息,通过引入竞争凝聚让系统主动学习,以实现对大量未知样本的检测。在入侵检测数据集和UCI基准数据集上的实验结果表明,该算法能有效提高系统的性能。 In order to solve the problem that lots of redundant information existed in network intrusion detection data and the traditional clustering algorithms were inadequate for detecting outlier, an intrusion detection algorithm based on prin- cipal component analysis (PCA) and semi-supervised clustering was proposed. First, the features of data were extracted by using PCA, and the redundant attributes among the data were eliminated. Then, a few labeled samples and pairwise constraints information were exploited, and competitive agglomeration was introduced to letting the system active learning in order that the detection of lots of unknown samples could be realized. The experimental results on intrusion detection data set and UCI benchmark data sets showed that this algorithm could effectively improve the system performance.
作者 丁彦 李永忠
出处 《山东大学学报(工学版)》 CAS 北大核心 2012年第5期41-46,共6页 Journal of Shandong University(Engineering Science)
基金 江苏省高校自然科学基金资助项目(05KJD52006) 江苏科技大学科研资助项目(2005DX006J)
关键词 入侵检测 PCA 半监督聚类 成对约束 竞争凝聚 intrusion detection principal component analysis (PCA) semi-supervised clustering pairwise constraints competitive agglomeration
  • 相关文献

参考文献20

二级参考文献73

  • 1陈华根,吴健生,王家林,陈冰.模拟退火算法机理研究[J].同济大学学报(自然科学版),2004,32(6):802-805. 被引量:133
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 3张敏,于剑.基于划分的模糊聚类算法[J].软件学报,2004,15(6):858-868. 被引量:176
  • 4冯力,管晓宏,郭三刚,高艳,刘培妮.采用规划识别理论预测系统调用序列中的入侵企图[J].计算机学报,2004,27(8):1083-1091. 被引量:11
  • 5徐晓华,陈崚.一种自适应的蚂蚁聚类算法[J].软件学报,2006,17(9):1884-1889. 被引量:55
  • 6Mukkamala S, Janoski G, Sung AH. Intrusion detection using support vector machines and neural networks[J]. Proc. of the IEEE Int'l Joint Conf. on Neural Networks. 2002: 1702--1707.
  • 7Eskin E, Arnold A, Prerau M. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data[C]. Applications of Data Mining in Computer Security. Kluwer Academic Publisher, Boston, 2002:77-- 102.
  • 8Zhu X j. Semi-Supervised. Learning I.iterature Survey [R]. Computer Sciences TR 1530. University of Wisconsin Madison, 2006.
  • 9Basu S, Bilenko M, Mooney R J. A probabilistic framework for semi-supervised clustering [C]. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, WA, 2004: 59--68.
  • 10KDD cup 1999 data[ R/OL]. [2008-- 03-- 28] http://kdd, ics. uci. edu/databases/kddcup99/kddcup99, html.

共引文献72

同被引文献88

  • 1吴旗,刘健男,寇文龙,张宗升.改进的单类支持向量机的网络流量检测[J].吉林大学学报(工学版),2013,43(S1):124-127. 被引量:3
  • 2李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:880
  • 3刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:184
  • 4吴庆涛,邵志清.入侵检测研究综述[J].计算机应用研究,2005,22(12):11-14. 被引量:19
  • 5陈志民,杨敬锋,陈其昌,张嘉琪,陈强.融合监督学习与凝聚层次聚类的土地评价方法[J].计算机工程与应用,2007,43(18):188-190. 被引量:3
  • 6周志华,杨强.机器学习及其应用[M].北京:清华大学出版社,2011.
  • 7BECCHETTI L, CASTILLO C, DONATO D, et al. Web spam detection: link-based and content-based tech- niques [ C ]//The European Integrated Project Dynami- cally Evolving, Large Scale Information Systems (DELLS): proceedings of the final workshop. Pader- born, Germany: [ s. n. ], 2008:99-113.
  • 8CASTILLO C, DONATO D, GIONIS A, et al. Know your neighbors : Web spam detection using the web topol- ogy [ C ]//Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, USA : ACM, 2007 : 423-430.
  • 9ABERNETHY J, CHAPELLE O, CASTILLO C. Graph regularization methods for Web spam detection [ J ]. Machine Learning, 2010, 81 (2) :207-225.
  • 10GENG Guanggang, LI Qiudan, ZHANG Xinchang. Link based small sample learning for web spam[ C]//Proceed- ings of the 18th International Conference on World Wide Web. New York, USA: ACM, 2009:1185-1186.

引证文献10

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部