期刊文献+

网络入侵特征优化检测方法仿真 被引量:4

Network Intrusion Feature Optimization Simulation Test Method
下载PDF
导出
摘要 网络入侵特征的伪装程度越来越高,使得入侵特征与正常数据特征在分类效果上的倾斜度越来越接近。传统的采用特征分类的入侵检测方法对训练入侵特征数据集的最佳类分布未知,都是假定误分类代价均等,只注重分类的精度敏感,忽视了类型间的区别,造成入侵检测不准。提出了一种敏感性数据挖掘的网络入侵特征检测算法。利用主成分分析方法,提取网络操作数据中的主成分,去除冗余数据,将网络入侵特征的敏感性引入到检测过程中,利用敏感性数据挖掘方法,获取网络操作数据中的恶意入侵操作行为的特征,从而完成网络入侵特征检测。实验结果表明,利用改进算法进行网络入侵特征优化检测,能够准确获取网络操作行为中的异常特征。 Research the accurate detection of network intrusion feature.The camouflage degree of network intrusion characteristic is higher and higher,which leads to intrusion detection inaccurate.The paper proposed a sensitivity data mining network intrusion detection algorithm.A principal component analysis method was used to extract the main components in the network operation data,and redundant data were removed.The sensitivity data mining method was used to obtain network operation data from malicious invasion operation behavior characteristics and to complete the characteristics of network intrusion detection.The simulation results show that the improved algorithm can accurately obtain anomaly characteristics of the network operation behavior.
作者 黄庆涛
出处 《计算机仿真》 CSCD 北大核心 2013年第9期282-285,共4页 Computer Simulation
关键词 网络入侵 特征检测 网络操作数据 网络安全 The network invasion Feature detection Network operation data Network security
  • 相关文献

参考文献8

二级参考文献29

  • 1隆茜,郭劲赤.985高校图书馆自建数据库的调查与分析[J].图书馆学研究(应用版),2010(9):27-31. 被引量:24
  • 2Kahn J,Katz R,Pister K.Next century challenges:mobile networking for smart dust[A].Proceedings of the Annual International Conference on Mobile Computing and Networking[C].New York,USA:ACM Press,1999.271 ~278.
  • 3Estrin D,Govindan R,Heidemann J,et al.Next century challenges:scalable coordination in sensor networks[A].Proceedings of the Annual International Conference on Mobile Computing and Networking[C].New York,USA:ACM Press,1999.263~ 270.
  • 4Asada G,Dong M,Lin T S,et al.Wireless integrated network sensors:low power systems on a chip[A].Proceedings of the 24th European Solid-State Circuits Conference[C].France:Editions Frontieres,1998.9~16.
  • 5Chandrakasan A,Amirtharajah R,Cho S H,et al.Design considerations for distributed microsensor systems[A].Proceedings of theIEEE Custom Integrated Circuits Conference[C].Piscataway,USA:IEEE,1999.279 ~286.
  • 6Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393 ~ 422.
  • 7Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-efficient communication protocol for wireless sensor networks[A].Proceedings of the Hawaii International Conference on System Sciences[C].Piscataway,USA:IEEE,2000.175 ~187.
  • 8ManjeshwaR A,Agrawal D.TEEN:a protocol for enhanced efficiency in wireless sensor networks[A].Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing[C].New York,USA:ACM Press,2001.304 ~309.
  • 9Bandyopadhyay S,Coyle E J.An energy efficient hierarchical clustering algorithm for wireless sensor networks[A].Proceedings of the IEEE INFOCOM[C].Piscataway,USA:IEEE,2003.1713 ~ 1723.
  • 10Heinzelman W,Chandrakasan A,Balakrishnan H.An application-specific protocol architecture for wireless microsensor networks[J].IEEE Transactions on Wireless Communications,2002,1 (4):660 ~ 670.

共引文献100

同被引文献30

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部