期刊文献+

一种应用聚类技术检测网络入侵的新方法 被引量:12

A Novel Clustering-Based Method to Network Intrusion Detection
下载PDF
导出
摘要 基于聚类技术提出了一种能处理不带标识且含异常数据样本的训练集数据的网络入侵检测方法。对网络连接数据作归一化处理后 ,通过比较数据样本间距离与类宽度W的关系进行数据类质心的自动搜索 ,并通过计算样本数据与各类质心的最小距离来对各样本数据进行类划分 ,同时根据各类中的样本数据动态调整类质心 ,使之更好地反映原始数据分布。完成样本数据的类划分后 ,根据正常类比例N来确定异常数据类别并用于网络连接数据的实时检测。结果表明 ,该方法有效地以较低的系统误警率从网络连接数据中检测出新的入侵行为 ,更降低了对训练数据集的要求。 Researchers have developed two general categories of intrusion detection, i.e. misuse detection and anomaly detection, which differ at model construction. Signature based misuse detection, which can detect the well known attacks, will do nothing when new attack comes. Even traditional anomaly detection can catch some new attacks, the learning process overly relying on the training data sets which contain either purely clean normal data or correctly labeled data makes it useless in most cases. To solve such a problem, a novel clustering based method, capable of proces sing training data sets without type label and/or containing unknown intrusion data, is presented in this paper. After the normalization of network connection data, cluster centroids which is null at first can be obtained gradually and automatically through comparing the distance between data instances and the predefined cluster width , and each data instance can be then classified into the cluster which has the minimum distance with it. To ensure that the clusters can best represent the data distribution, cluster centroids also can be dynamically adjusted according to data instances contained in this cluster. With the classified data instances, the anomaly data clusters can be easily identified using normal cluster ratio , therefore performing the real-time detecting of each real network connection datum. Experiment result shows that this method can not only detect some new attacks, from network connection data sets, with low false positive rate, but also tolerate more general data sets.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2002年第2期59-63,共5页 Journal of National University of Defense Technology
基金 国家"九七三"重点基础研究发展规划资助 (G19980 3 0 5 0 84)
关键词 入侵检测 检测率 误警率 网络安全 聚类分析 clustering intrusion detection detection rate false positive rate
  • 相关文献

参考文献7

  • 1Eskin E. Anomaly detection over noisy data using learned probability distributions[A]. Proceedings of the International Conference on Machine Learning, 2000.
  • 2Axelsson Stefan. Intrusion Detection Systems: A Survey and Taxonomy[EB]. http://citeseer.nj.nec.com/sc, 2000.
  • 3蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:369
  • 4Bonifacio J M, Cansian A M. Neural Networks Applied in Intrusion Detection Systems[EB]. http://citeseer.nj.nec.com/sc, 2000.
  • 5Lee W , Stolfo S J. Data Mining approaches for intrusion detection[A]. Proceedings of the 1998 USENIX Security Symposium, 1998.
  • 6KDD Cup 1999 Data[EB]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. 1999.
  • 7张平安 高春华 译.神经-模糊和软计算[M].西安交通大学出版社,2000.8-63.

二级参考文献9

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 4Bian Zhaoqi,Pattern Recognition,1988年
  • 5边肇祺,模式识别,1988年
  • 6何华灿,人工智能导论,1988年
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 8胡侃,夏绍玮.基于大型数据仓库的数据采掘:研究综述[J].软件学报,1998,9(1):53-63. 被引量:255
  • 9阮耀平,易江波,赵战生.计算机系统入侵检测模型与方法[J].计算机工程,1999,25(9):63-65. 被引量:49

共引文献369

同被引文献69

引证文献12

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部