期刊文献+

基于数据流的网络入侵实时检测框架 被引量:13

Real-time detection framework for network intrusion based on data stream
下载PDF
导出
摘要 针对计算机网络访问请求具有实时到达以及动态变化的特点,为了实时检测网络入侵,并且适应网络访问数据的动态变化,提出一个基于数据流的网络入侵实时检测框架。首先,将误用检测模式与异常检测模式相结合,通过初始聚类建立由正常模式和异常模式构成的知识库;其次,采用数据点与数据簇之间的不相似性来度量网络访问数据与正常模式和异常模式的相似性,从而判定网络访问数据的合法性;最后,当网络访问数据流发生演化时,通过重新聚类来更新知识库以反映网络访问的最近状态。在入侵检测数据集KDDCup99上进行实验,当初始聚类的样本数为10 000,缓冲区聚类的样本数为10 000,调节系数为0.9时,召回率达到91.92%,误报率达到0.58%,接近传统非实时检测模式的结果,但整个学习和检测过程只需扫描网络访问数据一次,并引入了知识库的更新机制,在入侵检测的实时性和适应性方面更具有优势。 The access request for computer network has the characteristics of real-time and dynamic change. In order to detect network intrusion in real time and be adapted to the dynamic change of network access data, a real-time detection framework for network intrusion was proposed based on data stream. First of all, misuse detection model and anomaly detection model were combined. A knowledge base was established by the initial clustering which was made up of normal patterns and abnormal patterns. Secondly, the similarity between network access data and normal pattern and abnormal pattern was measured using the dissimilarity between data point and data cluster, and the legitimacy of network access data was determined. Finally, when network access data stream evolved, the knowledge base was updated by reclustering to reflect the state of network access. Experiments on intrusion detection dataset KDDCup99 show that, when initial clustering samples are 10000, clustering samples in buffer are I0000, adjustment coefficient is 0. 9, the proposed framework achieves a recall rate of 91.92% and a false positive rate of 0. 58%. It approaches the result of the traditional non-real-time detection model, but the whole process of learning and detection only scans network access data once. With the introduction of knowledge base update mechanism, the proposed framework is more advantageous in the real-time performance and adaptability of intrusion detection.
出处 《计算机应用》 CSCD 北大核心 2015年第2期416-419,429,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272095 61175067 61303091 61379019 61403238) 山西省自然科学基金资助项目(2012061015) 山西省科技攻关项目(20110321027-02) 山西省回国留学人员科研项目(2013-014)
关键词 数据流 入侵检测 聚类 知识库 信息熵 data stream intrusion detection clustering knowledge base information entropy
  • 相关文献

参考文献5

二级参考文献55

  • 1田大新,刘衍珩,李永丽,唐怡.数据包过滤规则的快速匹配算法和冲突检测[J].计算机研究与发展,2005,42(7):1128-1135. 被引量:14
  • 2田大新,刘衍珩,魏达.ARTNIDS:基于自适应谐振理论的网络入侵检测系统[J].计算机学报,2005,28(11):1882-1889. 被引量:8
  • 3薄翠梅,张湜,王执铨,李俊.基于滑动时间窗的支持向量机软测量建模研究[J].自动化仪表,2006,27(1):45-48. 被引量:14
  • 4Heberlein L, security mon Privacy. Los 296-304 , Dias G V, Levitt K N, et itor [C]//Proc of the 1990 Symp Alamitos, CA: IEEE Computer A network Security and Society, 1990.
  • 5Callegarl C, Vaton S, Paqano M. A new statistical approach to network anomaly detection [C] //Proc of the 2008 Int Syrup on SPECTS. Los Alamitos, CA: IEEE Computer Society, 2008:441-447.
  • 6Fava D, Byers S, Yang. S. Projecting cyberattacks through variable-length Markov models[J]. IEEE Trans Information Forensics and Security, 2008, 3(3) : 359-369.
  • 7Duc D, Matsumoto K, Takishima Y, et al. Two stage incremental working set selection for fast support vector training on large datasets [C] //Proc of the 2008 IEEE Int Conf on RIVF. Los Alamitos, CA: IEEE Computer Society, 2008:221-226.
  • 8Latifur K, Awad M, Thuraisingham B. A new intrusion detection system using support vector machines and hierarchical clustering [J]. The VLDB Journal, 2007, 16 (4): 507-521.
  • 9Yasami Y, Khorsandi S, Mozaffari S, et al. An unsupervised network anomaly detection approach by k means clustering & ID3 algorithm [C]//Proc of the 2008 IEEE Syrup on ISCC. Los Alamitos, CA: IEEE Computer Society, 2008: 398-403.
  • 10Dartique C, Jang H, Zeng W. A new data-mining based approach for network intrusion detection [C] //Proc of the 7th Annual Conf on CNSR. Los Alamitos, CA: IEEE Computer Society, 2009, 372-377.

共引文献124

同被引文献89

引证文献13

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部