期刊文献+

一种多标记学习入侵检测算法 被引量:3

An intrusion detection algorithm based on multi-label learning
下载PDF
导出
摘要 针对现有入侵检测技术的不足,文章研究了基于机器学习的异常入侵检测系统,将多标记和半监督学习应用于入侵检测,提出了一种基于多标记学习的入侵检测算法。该算法采用"k近邻"分类准则,统计近邻样本的类别标记信息,通过最大化后验概率(maximum a posteriori,MAP)的方式推理未标记数据的所属集合。在KDD CUP99数据集上的仿真结果表明,该算法能有效地改善入侵检测系统的性能。 Aiming at some problems in current techniques of intrusion detection, the anomaly intrusion detection system based on machine learning is studied, and an intrusion detection algorithm based on muiti-label k-nearest neighbor with multi-label and semi-supervised learning is put forward. For each unlabeled datum, its k-nearest neighbors in the training set are firstly identified. After that, based on the statistical information gained from the label sets of these neighboring data, namely the number of neighboring data belonging to each possible class, maximum a posteriori(MAP) principle is utilized to determine the label set for the unlabeled data. KDD CUP99 dataset is implemented to evaluate the proposed algorithm. Compared to other algorithms, the simulation results show that the performance of intrusion detection system is improved by the proposed algorithm.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第7期929-933,共5页 Journal of Hefei University of Technology:Natural Science
基金 江苏省高校自然科学基金资助项目(05KJD52006) 江苏科技大学科研资助项目(2005DX006J)
关键词 多标记学习 ML-KNN算法 半监督学习 入侵检测 KDD CUP99数据集 multi-label learning multi-label k-nearest neighbor (ML-KNN) algorithm semi-supervisedlearning intrusion detection KDD CUP99 dataset
  • 相关文献

参考文献11

二级参考文献68

  • 1刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:186
  • 2王洪利,冯玉强.基于云模型具有语言评价信息的多属性群决策研究[J].控制与决策,2005,20(6):679-681. 被引量:68
  • 3李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1225
  • 4姜伟,高知新,李本喜.基于多维云模型的入侵检测[J].计算机工程,2006,32(24):155-156. 被引量:6
  • 5Bai Yuebin,Kobayashi H. Intrusion detection systems: teehnology and development[C]//Kawada S. Proeeedings of the 17th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2003 : 710-715.
  • 6Rroesch M. Snort-lightweight Intrusion detection for networks [C]//Ricketts S, Birdie C, Isaksson E. Proceedings of the 13th LISA Conference. Washington: USENIX, 1999: 229-238.
  • 7Brugger S T. Data mining methods for network intrusion detection[EB/OL].http://www-static.cc. gatech. edu/ -guofei/reading/brugger-dmnid.pdf, 2004.
  • 8Agrawal R, Srikant R. Fast algorithms for mining association rules [C]//Boeea J B, Jarke M, Zaniolo C. Proceed- ings of the 20th International Conference on Very Large Databases. San Francisco: Morgan Kaufmann Publishers Inc, 1994:487-499.
  • 9Rakesh A, Ramakrishnan S. Mining sequential patterns [C]//Yu P S, Chen ALP. Proceedings of the 11th International Conference on Data Engineering. Taipei: IEEE Computer Society, 1995: 3-14.
  • 10[1]EISEN M B,SPELLMAN P T,BROWN P O,et al.Cluster analysis and display of genome-wide expression patterns[C]// Proceedings of the National Academy of Science of the United States of America.Washington,D.C,USA,1998.

共引文献31

同被引文献17

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部