期刊文献+

基于机器学习的端口扫描入侵检测 被引量:4

Machine Learning-based Port Scanning Intrusion Detection
下载PDF
导出
摘要 在入侵检测系统发展的30年间,不断有新的检测方法被提出。在如今的第四次工业革命——人工智能的潮流中,机器学习算法为各种系统的方法解决提供了新的思路。基于2018年Daniel Fraunholz等人提出了的入侵检测模型,提出了一种基于机器学习的端口扫描检测系统,其中系统的特征提取参考了KDD Cup 99数据集中数据的特征提取,而其中的模型训练集是基于CICIDS2017数据集的。最后,模型测试结果优良。 In the 30 years of the development of intrusion detection systems,new detection methods are continuously proposed.In today’s fourth industrial revolution,that is,the tide of artificial intelligence,machine learning algorithms provide new ideas for the solution of various systems.Based on the intrusion detection model proposed by Daniel Fraunholz et al.in 2018,a machine learning-based port scanning detection system is proposed,in which the feature extraction refers to the feature extraction of the data in the KDD Cup 99 dataset,and the model training set is based on the CICIDS2017 dataset.Finally,the model test results are fairly good.
作者 郭楚栩 施勇 薛质 GUO Chu-xu;SHI Yong;XUE Zhi(School of Electronic Information and Electrical Engineering,Shanghai Jiaotong University,Shanghai 200240,China)
出处 《通信技术》 2020年第2期421-426,共6页 Communications Technology
基金 国家重点研发计划项目“网络空间安全”重点专项(No.2017YFB0803200)~~
关键词 端口扫描 入侵检测系统 特征提取 机器学习 port scanning intrusion detection system feature extraction machine learning
  • 相关文献

参考文献3

二级参考文献31

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2洪宏,张玉清,胡予濮,戴祖锋.网络安全扫描技术研究[J].计算机工程,2004,30(10):54-56. 被引量:30
  • 3COHEN F. Information system attacks: a preliminary classification scheme[J]. Computers and Security, 1997, 16(1):29-46.
  • 4TEKLA P, PAUL W. Can computer crime be stopped?[J]. IEEE Spectrum, 1984, 21(5): 34-45.
  • 5RUSSELL D, GANGEMI G. Computer Security Basics[M]. O'Reilly & Associates, Inc, 1991.
  • 6NEUMANN P, PARKER D. A summary of computer misuse techniques[A]. The 12th National Computer Security Conference[C]. USA, 1989. 396-407.
  • 7NEUMANN P. Computer Related Risks[M]. The ACM Press, 1995.
  • 8Vulnerabilities: taxonomy and classification[EB/OL]. http://tennis.ecs.umass.edu/ ~czou/link/security_ course/lecture5b, 2002.
  • 9JAYARAM N, MORSE P. Network security-a taxonomic view[A]. European Conference on Security and Detection[C]. UK, 1997. 124-127.
  • 10BELLOVIN S, CHESWICK W. Network firewalls[J]. IEEE Communications Maganize, 1994, 32(9): 50-57.

共引文献40

同被引文献28

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部