期刊文献+

基于SVM和D-S证据理论的入侵检测方法

Intrusion detection based on SVM and D-S evidence theory
下载PDF
导出
摘要 以D-S证据理论为基础,提出了一种基于支持向量机(SVM)分类器的入侵检测系统模型。根据TCP基本特征、内容特征和流量特征,采用3个SVM分类器对网络连接分类,将分类结果作为证据,利用D-S合成法则对分类输出进行融合和检测。实验表明,文中所提出的方法在入侵检测系统中的应用能有效降低误报率和漏报率,显著提高检测正确率。 Based on D-S evidence theory, a new IDS model using Support Vector Machine (SVM) classifiers is presented. According to TCP basic, content and flow features, we apply the three SVM to classify the network connections, and detect the output with the classified results and D-S combination theorem. The experimental result shows that the method can effectively decrease the false report rate and increase the accuracy.
作者 杨彦杰
出处 《长春工业大学学报》 CAS 2012年第6期620-624,共5页 Journal of Changchun University of Technology
基金 国家自然科学基金(60776807 61179045) 国家863计划重点课题(2006AA12A106)
关键词 入侵检测 数据融合 支持向量机 D-S证据理论 intrusion detection data fusion support vector machine D-S evidence theory.
  • 相关文献

参考文献16

  • 1Forrest S, Perelson A, Allen L. Self Nonself dis- crimination in a computer[C]//Proceedings of the 1994 IEEE Symposium on Research in Security and :'rivacy(lSP). Oakland, CA: IEEE Computer Soci- ety Press, 1994 : 202-212.
  • 2Ghosh A, Michael C, Schatz M. A real-time intru- sion detection system based on learning program be- havior[C]//Proceedings of Recent Advances in In- trusion Detection (RAID 2000). Toulouse: Spring- er-Verlag, 2000 : 93-109.
  • 3Lee W, Stolfo S J. Mok K W. A data mining framework for building intrusion detection model [C]//Proceedings of the 1999 IEEE Symposium on Security and Privacy(ISP). Oakland, CA: IEEE Computer Society Press,1999:120-132.
  • 4Cohen W W. Fast effective rule induction[C]//Pro- ceedings of the 12th International Conference onMachine Learning(ML-95). Lake Tahoe, CA: Mor- gan Kaufmann, 1995 : 115-123.
  • 5Barbara D, Wu N, Jajodia S. Detecting novel net- work intrusion using bayes estimators [C]//Pro- ceedings of the First SLAM Conference on Data Mining. Chicago: IL,2001:2-15.
  • 6Nguyen B. Introduction to Support Vector Ma chines and application to the computer security do main of anomaly detection[J]. Applied and Computa tional Mathematics Seminar, 2008,25 (4) : 1320-1328.
  • 7李健,范万春,何驰.基于多分类支持向量机的网络入侵检测技术[J].计算机应用,2005,25(7):1551-1553. 被引量:7
  • 8李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 9王勇.基于特征空间中样本选取与分离的SVM简化方法[J].长春工业大学学报,2008,29(5):486-491. 被引量:4
  • 10Bogler P. Shafter-dempster reasoning with applica- tion to multisensor target identification system[J]. IEEE Trans System Man and Cybernetics, 1987,17 (3) :968-977.

二级参考文献65

共引文献174

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部