期刊文献+

基于AFSA-KNN选择特征的网络入侵检测 被引量:11

Network intrusion detection based on AFSA-KNN selecting features
下载PDF
导出
摘要 针对网络入侵特征高维性和特征冗余严重等问题,提出一种K近邻算法(KNN)和改进人工鱼群算法选择特征的网络入侵检测模型(AFSA-KNN)。计算特征之间的关联度,采用KNN算法消除原始网络数据中的冗余特征;将得到的特征子集作为AFSA初始解,通过模拟鱼群的觅食、聚群及追尾行为找到最优特征子集;建立网络入侵检测分类器。实验结果表明,AFSA-KNN有效消除了冗余特征,减少分类器输入维数,提高了网络入侵检测正确率和检测速度。 For the serious problems exist in the network intrusion, such as high dimension and redundancy, a network intrusion detection model based on K nearest neighbor algorithm and improved artificial fish swarm algorithm was presented. Firstly, the correlation degree between features was computed, and KNN algorithm was used to eliminate redundant features in the original network data. Then the obtained feature subsets were taken as the initial solution of AFSA, and the simulation of feeding, clus- tering and the following behavior was used to find the best subset of features. Finally, the network intrusion detection classifier was established. The results show that AFSA-KNN can effectively eliminate redundant features and reduce the input dimension of classifier. It can also improve the network intrusion detection accuracy and detection speed.
作者 李佳
出处 《计算机工程与设计》 CSCD 北大核心 2014年第8期2675-2679,共5页 Computer Engineering and Design
关键词 特征选择 入侵检测 K近邻 特征关联性 人工鱼群算法 feature selection intrusion detection KNN feature relevance artificial fish swarm algorithm
  • 相关文献

参考文献12

  • 1Tan F, Fu X Z, Zhang Y Q, et al. A genetic algorithm-based method for feature subset selection [J]. Soft Computing, 2008, 12 (2): 111-120.
  • 2井小沛,汪厚祥,聂凯,罗志伟.面向入侵检测的基于IMGA和MKSVM的特征选择算法[J].计算机科学,2012,39(7):96-99. 被引量:15
  • 3Hu W M, Hu M, Maybank S. Adaboost based algorithm for network intrusion detection [J]. IEEE Transactions on Sys- tems, Man and Cybernetic, Path B: Cybernetics, 2008, 38 (2): 577-583.
  • 4Denning D E. An intrusion detection model [J]. IEEE Tran- saction on Software Engineering, 2010, 13 (2): 222-232.
  • 5Hang C L, Wang C J. A GA-based feature selection and pa- rameters optimization for support vector machines [J]. ExpertSystems withApplications, 2009, 31 (2): 231-240.
  • 6Khan L, Awad M, Thuraisingham B. A new intrusion detec- tion system using support vector machines and hierarchical clus- tering [J]. The VLDBJournal, 2007, 16 (4): 507-521.
  • 7张雪芹,顾春华.一种网络入侵检测特征提取方法[J].华南理工大学学报(自然科学版),2010,38(1):81-86. 被引量:28
  • 8郭文忠,陈国龙,陈庆良,余轮.基于粒子群优化算法和相关性分析的特征子集选择[J].计算机科学,2008,35(2):144-146. 被引量:21
  • 9Kim D S, Nguyen H N, Ohn SY. et al. Fusions of GA and SVM for anomaly detection in intrusion detection system [J]. Advances in Neural Networks, 2009, 10 (1): 415-420.
  • 10Gao YF, Chen YD. The optimization of water utilization based on artificial fish-swarm algorithm [C] //Sixth Interna tional Conference on Natural Computation, 2010: 4415-4419.

二级参考文献44

  • 1杨孔雨,王秀峰.免疫记忆遗传算法及其完全收敛性研究[J].计算机工程与应用,2005,41(12):47-50. 被引量:14
  • 2乔立岩,彭喜元,彭宇.基于微粒群算法和支持向量机的特征子集选择方法[J].电子学报,2006,34(3):496-498. 被引量:24
  • 3陈彬,洪家荣,王亚东.最优特征子集选择问题[J].计算机学报,1997,20(2):133-138. 被引量:96
  • 4陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 5Blum A L, Langley P. Selection of relevant features and examples in machine learning [J]. Artificial Intelligence, 1997,97(1/2) :245-271.
  • 6Baglioni M, Furletti B, Turini F. DrC4.5 : improving C4. 5 by means of prior knowledge [ C ] //Proc of the ACM Symp on Applied Computing. Santa Fe : ACM, 2005 : 474- 481.
  • 7Kim D S, Park J S. Network based intrusion detection with support vector machines [ C ] // Information Networking. Berlin/Heidelberg : Springer-Verlag, 2003:747-756.
  • 8Kim D S, Nguyen H N, Ohn S Y. et al. Fusions of GA and SVM for anomaly detection in intrusion detection system [ C ] //Advances in Neural Networks. Berlin/Heidelberg : Springer-Verlag, 2005 : 415 - 420.
  • 9Theodoridis Sergios, Koutroumbas Konstantinos. Pattern recognition [ M ]. 2nd ed. Salt Lake City: Elsevier Academic Press, 1999.
  • 10Cortes C, Vapnik V. Support vector networks [ J ]. Machine Learning, 1995,20 ( 3 ) : 273- 297.

共引文献142

同被引文献78

  • 1白耀辉,陈明,王举群.利用朴素贝叶斯方法实现异常检测[J].计算机工程与应用,2005,41(34):131-132. 被引量:8
  • 2卢鋆,吴忠望,王宇,卢昱.基于kNN算法的异常行为检测方法研究[J].计算机工程,2007,33(7):133-134. 被引量:12
  • 3张毅,梁艳春.蚁群算法中求解参数最优选择分析[J].计算机应用研究,2007,24(8):70-71. 被引量:19
  • 4Gungor V C; Lu B, Hancke G P. Opportunities and challenges of wireless sensor networks in smart grid[J]. IEEE Transactions on Industrial Electronics, 2010, 57(10): 3557-3564.
  • 5Arnold J N, Wormald M R, Sim R B, et al. The impact of glycosylation on the biological functionand structure of human immunogiobulins[J]. Annu. Rev. Immunol., 2007, 25: 21-50.
  • 6Kuang L, Zulkernine M. An anomaly intrusion detection method using the csi-knn algorithm[C]. Proceedings of the 2008 ACM symposium on Applied computing. ACM, 2008: 921-926.
  • 7冯莹莹,余世干,刘辉.KNN-IPSO选择特征的网络入侵检测[J].
  • 8Wang C, Feng T, Kim Let al. Catching packet droppers and modifiers in wireless sensor networks[C]. The 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2009:1-9.
  • 9Sun T, Liu X. Agent-based intrusion detection and self-recovery system for wireless sensor networks[C]. The 5th IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT). IEEE, 2013: 206-210.
  • 10Sedjelmaci H, Senouci S M. Efficient and lightweight inmision detection based on nodes' behaviors in wireless sensor networks[C]. Global Information Infi'astzucture Symposium, 2013. IEEE, 2013: 1-6.

引证文献11

二级引证文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部