期刊文献+

基于SVM-KNN的半监督托攻击检测方法 被引量:3

Semi-supervised shilling attacks detection method based on SVM-KNN
下载PDF
导出
摘要 针对支持向量机方法在标记用户数据不充分的情况下无法有效实现托攻击检测的不足,提出一种基于SVM-KNN的半监督托攻击检测方法。根据少量标记用户数据训练一个初始SVM分类器,利用初始SVM对大量未标记用户数据进行分类,挑选出分类边界附近有可能成为支持向量的样本点,利用KNN分类器优化边界向量的标记质量,再将重新标注过的边界向量融入训练集,迭代训练逐步改善SVM的分类边界,最终获得系统决策函数。实验结果表明在标记用户数据较少的情况下,方法能有效提高托攻击的检测精度和效率,具有较强的推广能力。 Traditional support vector machine drops significantly when only a few labeled training samples is available. To ad- dress this problem, a new SVM-KNN classification method based on semi-supervised learning is proposed. In the first stage, use the few labeled training samples to train a weaker SVM classifier. And in the second stage, make use of the boundary vectors to improve the weaker SVM iteratively by introducing KNN. Using KNN classifier doesn't enlarge the number of training exam- ples only, but also improves the quality of the new training samples which are transformed from the boundary vectors. Then the proposed model is used to shilling attacks detection on recommender systems, the experimental results show that the proposed method can improve the classification accuracy, effective and easy to use in the case of fewer labeled training samples.
出处 《计算机工程与应用》 CSCD 2013年第22期7-10,共4页 Computer Engineering and Applications
基金 辽宁省社会科学规划基金项目(No.L10BJL035) 中央高校专项科研基金(No.DUT10RW302)
关键词 攻击检测 半监督学习 支持向量机 K最近邻 shilling attacks detection semi-supervised learning support vector machine K-nearest neighbor
  • 相关文献

参考文献16

二级参考文献57

  • 1曾文华,马健.支持向量机增量学习的算法与应用[J].计算机集成制造系统-CIMS,2003,9(z1):144-148. 被引量:27
  • 2尹清波,张汝波,李雪耀,王慧强.基于线性预测与马尔可夫模型的入侵检测技术研究[J].计算机学报,2005,28(5):900-907. 被引量:29
  • 3[1]K Ilgun,R Kemmerer,P Porras.State transition analysis:A rule-based intrusion detection approach.IEEE Trans on Software Engineering,1995,21(3):181-199
  • 4[2]Chen Wunhwa,Sheng Hsun Hsu,Hwang-Pin Shen.Application of SVM and ANN for intrusion detection.Computers & Operations Research,2005,32(10):2617-2634
  • 5[5]S A Hofmeyr,S Forrest,A Somayaji.Intrusion detection using sequences of system calls.Journal of Computer Security,1998,6(3):151-180
  • 6[6]W Lee,X Dong.Information-Theoretic measures for anomaly detection.In:Proc of the 2001 IEEE Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2001.130-143
  • 7[7]Dit-Yan Yeung,Yuxin Ding.Host-based intrusion detection using dynamic and static behavioral models.Pattern Recognition,2003,36(1):229-243
  • 8[8]Zhang Zonghua,Shen Hong.Application of online-training SVMs for real-time intrusion detection with different considerations.Computer Communications,2005,28(12):1428-1442
  • 9[9]C Kruegel,D Mutz,F Valeur,et al.Bayesian event classification for intrusion detection.In:Proc of the 19th Annual Computer Security Applications Conf.Los Alamitos,CA:IEEE Computer Society Press,2000
  • 10[10]W Lee,S Stolfo,P Chan,et al.Real time data mining-based intrusion detection.In:Proc of the Second DARPA Information Survivability Conf and Exposition.Los Alamitos,CA:IEEE Computer Society Press,2001.89-100

共引文献100

同被引文献17

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部