期刊文献+

基于贝叶斯逐步判别法的入侵检测模型研究 被引量:2

Research on Intrusion Detection Model Based on Bayesian Stepwise Discriminant Method
原文传递
导出
摘要 基于贝叶斯逐步判别法构建入侵检测模型,将入侵检测转化为一个分类判别问题,基于步进式引入的方法淘汰冗余的特征变量,能够在保障判别效果的前提下有效降低原分类判别函数的计算复杂度.使用KDD CUP99数据中10%数据集作为实验数据,以常见的拒绝服务攻击(DoS攻击)为例创建具体的模型实例,实验结果表明,模型对于样本内连接记录的回代判对率和样本外连接记录的检测正确率均较高. In this paper, we build a intrusion detection model based on bayesian stepwise discriminant method. The model transforms intrusion detection problem into a discriminant classify problem. The redundant characteristic variables are eliminated by the stepwise in- troducing method which can decrease original discriminant classify functions' computational complexity without negative influence to discriminant effect. The 10% data set of KDD CUP99's data is used as experimental data. Normal data and the data of denial of service (DOS) attack is used to instantiate the model. The results show the model's high correct discriminant rate of back substitution with sample data and high correct detection rate with out-of-sample-data.
出处 《数学的实践与认识》 CSCD 北大核心 2013年第9期172-180,共9页 Mathematics in Practice and Theory
基金 国家自然科学基金青年项目(71002094) 辽宁省高等学校优秀人才支持项目(WJQ2011043)
关键词 贝叶斯判别法 逐步判别法 入侵检测 bayesian discriminant method stepwise discriminant method intrusion detection
  • 相关文献

参考文献9

  • 1Forrest S, Hofmeyr S A, Somayaji A, et al. A sense of self for unix processes[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland. IEEE Computer Society press, 1996: 120-128.
  • 2Jha S, Tan K, Maxion R. Markov chains, classifiers, and intrusion detection A[C]//Computer Security Foundations Workshop of the 14th IEEE, Cape Breton, Novia Scotia, Canada: IEEE press, 2001.
  • 3谭小彬,王卫平,奚宏生,殷保群.计算机系统入侵检测的隐马尔可夫模型[J].计算机研究与发展,2003,40(2):245-250. 被引量:46
  • 4徐明,陈纯,应晶.一个两层马尔可夫链异常入侵检测模型(英文)[J].软件学报,2005,16(2):276-285. 被引量:7
  • 5Portnoy L, Eskin E, Stolfo S J. Intrusion detection with unlabeled data using clustering[C]// DMSA 2001: Proceedings of 2001 ACM CSS Workshop on Data Mining Applied to Security. Philadelphia, PA: ACM Press, 2001: 5-8.
  • 6Lazarevic A, Ertoz L, Kumar V, et al. A comparative study of anomaly detection schemes in network intrusion detection[C]//Proceedings of the Third Siam International Conference on Data Mining, New York: ACM Press, 2003: 801-813.
  • 7王令剑,滕少华.聚类和时间序列分析在入侵检测中的应用[J].计算机应用,2010,30(3):699-701. 被引量:11
  • 8薛静锋,曹元大.贝叶斯分类在入侵检测中的应用研究[J].计算机科学,2005,32(8):60-63. 被引量:7
  • 9党耀国,米传民,钱吴永.应用多元统计分析[M].北京:清华大学出版社,2012.

二级参考文献43

  • 1赵铁山,李增智,高波.时间序列模型在入侵检测中的应用研究[J].计算机工程与设计,2005,26(5):1128-1129. 被引量:3
  • 2杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 3PORTNOY L,ESKIN E,STOLFO S J.Intrusion detection with unlabeled data using clustering[C]// DMSA 2001:Proceedings of 2001 ACM CSS Workshop on Data Mining Applied to Security.Phila delphia,PA:ACM Press,2001:5-8.
  • 4LAZAREVIC A,ERTOZ L,KUMAR V,et al.A comparative study of anomaly detection schemes in network intrusion detection[C]// Proceedings of the 3rd SIAM Conference on Data Mining.New York:ACM Press,2003:801-813.
  • 5University of California.KDD Cup 1999 DATASETS[EB/OL].[2009-04-20].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  • 6LEE W.A data mining framework for building intrusion models[C]// Proceedings of the 1999 IEEE Symposium on Security and Privacy.Washington,DC:IEEE Computer Society,1999:120-132.
  • 7TENG SHAO-HUA,ZHANG WEI,ZHU ZHO-HUI,et al.DDoS attack detection and defense based on feature and data fusion[J].System and Information Sciences Notes,2007,1(4):390-395.
  • 8HanJiawei KamberM 范明 孟小峰 译.数据挖掘:概念与技术[M].北京:机械工业出版社,2003.279-285.
  • 9Mukherjee B, Heberlein LT, Levitt KN. Network intrusion detection. IEEE Network; 1994,8(3):26-41.
  • 10Denning DE. An intrusion-detection model. IEEE Trans on Software Engineering 1987,13(2):222-232.

共引文献72

同被引文献8

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部