期刊文献+

网络攻击检测中的机器学习方法综述 被引量:6

MACHINE LEARNING APPROACHES FOR NETWORK INTRUSIONDETECTION: A SURVEY
下载PDF
导出
摘要 在详细介绍网络攻击检测系统机器学习原理的基础上,对现有的各种方法进行了评述,并结合网络攻击检测系统的应用需求,阐述了网络攻击检测系统机器学习技术的发展方向。 With the developement of network technology and network connection scales, network security has already been an important research task. In this regard it is imperative to detect those unseen system attacks in an automated monitoring environment. As a new kind of network security technology, network intrusion detection seeks to detect attacks in an organization's security policy quite simply. However, existing intrusion detection systems rely heavily on human analysts to differentiate intrusive from non-intrusive network traffic. For such purpose machine learning techniques are used to provide decision aids for the analysts and automatically generate rules for computer network intrusion detection. Machine learning can be viewed as the attempt to build computer programs that improve performance of some task though learning and experience. This investigation goes back to the middle of 1990's. The present review gives a brief introduction to 6 kinds of machine learning approaches for network intrusion detection system, namely, Data Mining, Neural Networks, Genetic Algorithms, Decision Trees, Rough Sets and Immune System-Based Approach. Their principles and learning processes are presented in details. On the basis of the introduction , the respective advantages and disadvantages are commented. In the end, the developing directions of machine learning techniques are addressed according to the application requirements of network intrusion detection system.
出处 《安全与环境学报》 CAS CSCD 2001年第1期30-36,共7页 Journal of Safety and Environment
关键词 网络攻击 检测系统 机器学习技术 网络信息系统 安全防护 network security intrusion detection machine learning
  • 相关文献

参考文献30

  • 1Sinclair C, Pierce L, Matzner S. An application of machine learning to network intrusion detection[A]. In: Proceedings of the 15th Annual Computer Security Applications Conference, 1999, 371~ 377
  • 2Lane T, Brodley C. An application of machine learning to anomaly detection[A]. In: Proceedings of the 20th National Information Systems Security Conference, 1997, 366~377
  • 3Agrawal R. Database mining: a performance perspective[J]. IEEE Transactions on Knowledge and Data Engineering, 1993, 5(6): 914~925
  • 4Chen M S, Han J, Yu P S. Data mining: an overview from a database perspective[J]. IEEE Trans on Knowledge and Data Engineering, 1996, 8(6): 866~883
  • 5Fayyad U, Piatetsky-Shapiro G, Smyth P. The KDD process of extracting useful knowledge from volumes of data[J].Communications of the ACM, 1996, 39(11):27~34
  • 6Lee W, Stolfo S J. Data mining approaches for intrusion detection[A]. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, 1998, 26~40
  • 7Lee W, Stolfo S J, Mok K W. A data mining Framework for building intrusion detection models[A]. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy,1999, 1~20
  • 8Cohen W W. Fast effective rule induction[A]. In: Machine Learning: the 12th Inter-national Conference, Lake Thao,CA, 1995
  • 9Agrawal R, Imielinski T. Mining association rules between sets of items in large database[A]. In: Proceedings of the ACM SIGMOD Conference on Management of Data, 1993, 207~216
  • 10Agrawal R, Srikant R. Fast Algorithms for mining association rules[A]. In: Proceedings of the 20th VLDB Conference,Santiago, Chile, 1994

同被引文献74

引证文献6

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部