期刊文献+

机器学习在网络安全入侵检测中的应用

Application of Machine Learning in Network Security Intrusion Detection
下载PDF
导出
摘要 网络入侵检测技术能够对系统进行实时检测或事后检测,及时发现、防范各种复杂多变的网络攻击企图、攻击行为与攻击结果。同时网络入侵检测技术也是网络空间安全中一个具有挑战性的网络安全问题,机器学习对入侵检测技术性能的提高成为热门研究内容。文章综述了近些年来几种典型的群体智能优化算法,及其与支持向量机相结合的网络入侵检测技术,最后对机器学习在网络安全入侵检测中的未来发展前景进行展望。 Network intrusion detection technology can detect the system in real time or after the detection,timely find and prevent various complex and changeable network attack attempts,attack behavior and attack results.At the same time,the network intrusion detection technology is also a challenging network security problem in the network space security.This paper summarizes several typical swarm intelligence optimization algorithms in recent years,and its network intrusion detection technology combined with support vector machine.Finally,the future development prospect of machine learning in network security intrusion detection is prospected.
作者 吴乔 WU Qiao
机构地区 延安大学
出处 《科技创新与应用》 2020年第25期1-4,共4页 Technology Innovation and Application
关键词 机器学习 入侵检测 网络安全 machine learning intrusion detection network security
  • 相关文献

参考文献12

二级参考文献86

  • 1毛勇,周晓波,皮道映,孙优贤,WONG Stephen T.C..Parameters selection in gene selection using Gaussian kernel support vector machines by genetic algorithm[J].Journal of Zhejiang University-Science B(Biomedicine & Biotechnology),2005,6(10):961-973. 被引量:11
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 3李炳宇,萧蕴诗,汪镭.PSO算法在工程优化问题中的应用[J].计算机工程与应用,2004,40(18):74-76. 被引量:53
  • 4陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报,2007,18(7):1639-1651. 被引量:78
  • 5Zhang Yongguang.Feature deduction and ensemble design of intrusion systems[J].Computers&Security,2004,20(8):1360-1361.
  • 6Lee W K.Feature selection of intrusion data using a hy-brid genetic algorithm approach[J].Wireless Networks,2007,13(6):459-460.
  • 7Sung A H.Identify important features for intrusion detection using support vector machines and neural networks[C]//IEEE Proceedings of the2003Symposium on Applica-tion and the Internet,2003:209-217.
  • 8Vilaplana V,Marques F,Salembier P.Binary partition trees for object detection[J].IEEE Transactions on Image Pro-cessing,2008,17(11):2201-2216.
  • 9DENNING D. E, An Intrusion Detection Model[J]. IEEE Transaction on Soi'tware Engineering, 2010,13 (2), 222- 232.
  • 10Durga Prasad Muni, Nikhil R Pal, Jyotirmoy Das. Genetic programming for simultaneous feature selection and classifier design[J~. IEEE Transactions on Systems, Man, and Cyber- netics Part B, February, 2009,36(1) ~106- 117.

共引文献283

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部