期刊文献+

基于改进非广延熵特征提取的双随机森林实时入侵检测方法 被引量:6

Online Double Random Forests Intrusion Detection Based on Non-extensive Entropy Features Extraction
下载PDF
导出
摘要 在网络骨干链路的高速、大数据量环境下,相对于正常数据,攻击及异常数据相对较少,进行实时入侵检测难度大。针对此问题,提出了一种基于改进非广延熵特征提取和双随机森林的实时入侵检测方法。利用非广延熵,提取出流量属性取值分布的多维特征,通过对非广延熵的改进来降低特征间的相关性。使用完整的特征样本集建立第一个随机森林检测模型,使用包含攻击数据的特征样本子集建立第二个随机森林检测模型,通过双随机森林检测算法实现对少量异常的有效检测。实验结果表明,该方法能够在有限流量信息的基础上获得较高的检测精确率和召回率,其时间和空间复杂度适当,适合于对骨干链路的实时入侵检测。 This paper proposed an intrusion detection method that can be used in high speed network backbone. Based on non-extensive entropy with different parameters, the original distribution of the values of attributes was decomposed to high dimensional features. Using these detailed features, the detection model based on random forest was construe- ted. For the purpose of increasing detection accuracy and recall further, the second random forest detection model was constructed with the attack instances only. The experimental results suggest that proposed intrusion detection method can achieve competitive detection precision with a high recall.
出处 《计算机科学》 CSCD 北大核心 2013年第12期192-196,218,共6页 Computer Science
基金 信息保障技术重点实验室开放基金(KJ-12-04)资助
关键词 网络流量 入侵检测 非广延熵 随机森林 Network traffic, Intrusion detection, Non-extensive entropy, Random forest
  • 相关文献

参考文献2

二级参考文献1

共引文献36

同被引文献43

  • 1郭山清,高丛,姚建,谢立.基于改进的随机森林算法的入侵检测模型(英文)[J].软件学报,2005,16(8):1490-1498. 被引量:18
  • 2OWASP(OpenWebApplicationSecurityProject),开放式Web应用程序安全项目[EB/OL].http://www.owasp.org,2013-01-31.
  • 3CWE(CommonWeaknessEnumeration),通用缺陷列表[EB/OL].http://www.applicure.com,2013-01-31.
  • 4Hall, Mark. Web application vulnerabilities on rise[M]. Computerworld, Elsevier Inc, 2007.
  • 5Heady R, Luger G, Maccabe A, et al. The architecture of a network level intrusion detection system[R]. Technical report, Computer Science Department, University of New Mexico, August 1990.
  • 6Xydas I. Host-based web anomaly intrusion detection system, an artificial immune system approach[C]//Proceedings of the lASTED International Conference on Artificial Intelligence and Applications, 2008:258-265.
  • 7Shaimaa E S, Mohamed I M, Laila M E, et al. Web Server Logs Preprocessing for Web Intrusion Detection[J].Computer and Information Science, 2011.
  • 8MA J B, YU H W, GAO C L. Study of the Issue of Personnel Promotion Based on Fuzzy Comprehensive Evaluation[C]//Information Science and Management Engineering (ISME), 2010:511-513.
  • 9LEU, Sou-Sen ; CHANG, Ching-Miao, Bayesian-network-based safety risk assessment for steel construction projects[C]//Accident; analysis and prevention, 2013:122-33.
  • 10百度百科.正则表达式[EB/OL].http://baike.baidu.com/view/94238.htm?fr=Aladdin,2014-11-13- . .

引证文献6

二级引证文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部