期刊文献+

基于粗糙集与改进LSSVM的入侵检测算法研究 被引量:7

Study on intrusion detection algorithm based on rough set theory and improved LSSVM
下载PDF
导出
摘要 提出了基于粗糙集和改进最小二乘支持向量机的入侵检测算法。算法利用粗糙集理论的可辨识矩阵对样本属性进行约简,减少样本维数;利用稀疏化算法对最小二乘支持向量机进行改进,使其既具备稀疏化特性又具备快速检测的特点,提高了数据样本分类的准确性。结合算法不仅充分发挥粗糙集对数据有效约简和支持向量机准确分类的优点,同时克服了粗糙集在噪声环境中泛化性较差,支持向量机识别有效数据和冗余数据的局限性。通过实验证明,基于粗糙集和改进最小二乘支持向量机的入侵检测算法的检测精度高,误报率和漏报率较低,检测时间短,验证了算法的实效性。 This thesis proposes the intrusion detection algorithm based on rough set and the improved least squares support vector machine. The algorithm reduces sample attributes by discernible matrix using rough set theory, reduces the dimen- sion of the data samples. It improves the least squares support vector machine by a sparse algorithm, so it can improve the veracity of data sample classification with the sparse characteristic and rapid detection. On the one hand the combined algorithm has the advantages that rough set can reduce the data effectively and the support vector machine can classify accurately, and on the other hand it avoids the poor generalization while the rough set is in the noise environment and overcomes the limitations when support vector machine identifies effective data and redundant data. Experimental results show that intrusion detection algorithm based on rough set and the improved least squares support vector machine has high detection accuracy, low false positive rate and false negative rate and short detection time which show the validity of the algorithm.
出处 《计算机工程与应用》 CSCD 2014年第2期99-102,共4页 Computer Engineering and Applications
关键词 入侵检测 粗糙集理论 支持向量机 intrusion detection rough sets theory support vector machine
  • 相关文献

参考文献6

  • 1林升梁,刘志.基于RBF核函数的支持向量机参数选择[J].浙江工业大学学报,2007,35(2):163-167. 被引量:142
  • 2Dorothy E Denning.An intrusion-detection model[].IEEE Transactions on Software Engineering.1987
  • 3Steven E Smaha.Haystack: an intrusion detection system[].Proceedings of the IEEE Fourth Aerospace Computer Security Applications Conference.1988
  • 4Wong SKM,Ziarko W.On optimal decision rules in decision tables[].Bulletin of the Polish Academy of Sciences.1985
  • 5D Randall Wilson,Tony R Martinez.Improved heterogeneous distance functions[].Journal of Artificial Organs.1997
  • 6杨光,巫春玲,程远征.基于RS和WSVM的网络入侵检测算法研究[J].计算机仿真,2011,28(5):175-178. 被引量:3

二级参考文献17

  • 1李盼池,许少华.支持向量机在模式识别中的核函数特性分析[J].计算机工程与设计,2005,26(2):302-304. 被引量:98
  • 2J A K Suykens, J Vandewalle. Recurrent Least Squares Support Vector Machines [ J ]. IEEE Transactions on Circuits and Systems, 2000,7(7) :1109-1112.
  • 3VN Vapnik. Statistical Learning Theory [ M ]. New York. New York Wiley. 1998.23-55.
  • 4Bai Rujiang, Wang Yue. An effective hybrid classifier base on rough sets and neural networks[ C ]. Proceedings of the 2006 LEEE International Conferrence on Web Intelligent Agent Technology. Dec,2006.57-62.
  • 5Chen Bor-Sen, Peng Sen-Chueh and Wang Ku-Chen. Traffic Modeling, Prediction, and Congestion Control for High- Speed Networks : A Fuzzy AR Approach [ J ]. IEEE Transaction on Fuzzy Systems. 2000,8(5) : 491-506.
  • 6L Zhang, W Zhou, L C Jiao. Wavelet support vectoe machine[ J]. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cy- bernetics, 2004,34( 1 ) :34-39.
  • 7D R Wilson, T R Martinez. Improved heterogeneous distance functions . Journal of Artificial Intelligence Research [ J ]. 1997, 6(1) : 1-34.
  • 8Shin Hyunjung, Chao Sungzoon. Invariance of Neighborhood Re- lation Under Input Space to Feather Space Mapping[ J]. Pattern Recognition Letters, 2004,26(6) :707-718.
  • 9LUNTS A,BRAILOVSKIY V.Evaluation of attributes obtained in Statistical Decision Rules[J].Engineering Cybemetics,1967(3):98-109.
  • 10CHAPELLE O,VAPINK V N.Choosing multiple parameters for support vector machines[J].Machine Learning,2002,46:131-159.

共引文献142

同被引文献57

  • 1何慧,苏一丹,覃华.基于信息增益的贝叶斯入侵检测模型优化的研究[J].计算机工程与科学,2006,28(6):38-40. 被引量:9
  • 2HAN J W,KAMBER M.数据挖掘概念与技术[M].范明,孟小峰,译.北京:机械工业出版社,2000.
  • 3Krontiris I,Benenson Z,Giannetsos T,et al.Cooperative intrusion detection in wireless sensor networks[C]//LNCS 5432:Proceedings of EWSN 2009,2009:263-278.
  • 4Lee W,Stolfo S J,Chan P K.Real time data miningbased intrusion detection[C]//Proceedings of the DARPA Information Survivability Conference and Exposition II(DISCEXII).Anaheim,CA:IEEE Computer Society,2001:85-100.
  • 5Patcha A,Park J.An overview of anomaly detection techniques:existing solutions and latest technological trends[J].Compute Networks,2007,51(12):3448-3470.
  • 6Harry Z,Sheng S L.Learning Weighted Naive Bayes with accurate ranking[C]//Proceedings of the 4th IEEE International Conference on Data Mining(ICDM 04),Brighton,UK,2004:567-570.
  • 7Pawlak Z.Rough sets[J].International Journal of Parallel Programming,1982,11(5):341-356.
  • 8Kennedy J,Eberhart R C.Particle swarm optimization[C]//Proceedings of the IEEE International Conference on Neural Networks.Piscataway,NJ:IEEE Service Center,1995:1942-1948.
  • 9Information and Computer Science University of California.Irving KDD Cup 1999 data[EB/OL].(2010-09-20)[2014-04-30].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  • 10陈宁,徐同阁.NetFlow流量采集与存储技术的研究实现[J].计算机应用研究,2008,25(2):559-561. 被引量:12

引证文献7

二级引证文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部