期刊文献+

Intrusion Detection Method Based on Improved Growing Hierarchical Self-Organizing Map 被引量:2

Intrusion Detection Method Based on Improved Growing Hierarchical Self-Organizing Map
下载PDF
导出
摘要 Considering that growing hierarchical self-organizing map(GHSOM) ignores the influence of individual component in sample vector analysis, and its accurate rate in detecting unknown network attacks is relatively lower, an improved GHSOM method combined with mutual information is proposed. After theoretical analysis, experiments are conducted to illustrate the effectiveness of the proposed method by accurately clustering the input data. Based on different clusters, the complex relationship within the data can be revealed effectively. Considering that growing hierarchical self-organizing map (GHSOM) ignores the influence of individ- ual component in sample vector analysis, and its accurate rate in detecting unknown network attacks is relatively lower, an improved GHSOM method combined with mutual information is proposed. After theoretical analysis, experiments are conducted to illustrate the effectiveness of the proposed method by accurately clustering the input data. Based on different clusters, the complex relationship within the data can be revealed effectively.
出处 《Transactions of Tianjin University》 EI CAS 2016年第4期334-338,共5页 天津大学学报(英文版)
基金 Supported by the Natural Science Foundation of Tianjin(No.15JCQNJC00200)
关键词 growing hierarchical self-organizing map(GHSOM) hierarchical structure mutual information intrusion detection network security growing hierarchical self-organizing map (GHSOM) hierarchical structure mutual information in- trusion detection network security
  • 相关文献

参考文献3

二级参考文献58

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 2FAOUR A, LERAY P, ETER B. Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems[A]. Proceedings of 1st IFIP International Conference on New Technologies, Mobility and Security[C]. Paris, France, 2007.
  • 3Index of / databases/kddcup99 [EB/OL]. http://kdd.ics.uci.edu/data- bases/kddcup99.2009.
  • 4JIANG D B, YANG Y H, XIA M. Research on intrusion detection based on an improved sore neural network[A]. Proceedings of Fifth International Conference on Information Assurance and Security[C]. Xi'an, China, 2009. 400-403.
  • 5DEPREN O, TOPALLAR M, ANARIM E, et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks[J]. Expert Systems with Applications,2005,29: 713-722.
  • 6RAMADAS M, OSTERMANN M, TJADEN B. Detecting anomalous network traffic with self-organizing maps[A]. Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection[C]. Pittsburgh, PA, USA, 2003.
  • 7RAUBER A, MERKL D, DrFFENBACH M. The growing hierarchical self-organizing map: Exploratory analysis of high-dimensional data[J]. IEEE Transactions on Neural Networks, 2002,13(6): 1331-1341.
  • 8PALOMO E J, DOMINGUEZ E, LUQUE R M, et al. A new GHSOM model applied to network security[J]. Lecture Notes in Computer Science Springer, 2008, 5168: 680-689.
  • 9PALOMO E J, DOMINGUES E, LUQUE R M, et al. An intrusion detection system based on hierarchical self-organization[J]. Journal of Information Assurance and Security4, 2009, 4(3): 209-216.
  • 10LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.

共引文献251

同被引文献18

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部