期刊文献+

一种采用遗传规划优化的基于非负矩阵分解的入侵检测模型 被引量:1

An Intrusion Detection Model Based on Nonnegative Matrix Factorization Optimized by Genetic Programming
下载PDF
导出
摘要 利用非负矩阵分解对系统监控的特权程序行为进行检测,进而发现异常的入侵行为.在矩阵分解过程中采用Alpha散度作为度量标准,并引入遗传规划算法对非负矩阵分解中的误差函数进行优化.实验中,对新墨西哥大学的Sun SPARC工作站上获取的系统调用数据和CICIDS2017数据集进行了测试,测试结果表明,该方法相对于传统的检测方法而言,在入侵检测精度方面具有良好性能. In the paper,nonnegative matrix factorization has been used to detect privileged program behavior of system monitoring,and then abnormal intrusion behavior been found.In the process of matrix factorization,Alpha-divergence is used as the measurement standard,and genetic programming algorithm is introduced to optimize the error function in non-negative matrix factorization.In the experiment,we have tested the system call data obtained from the Sun SPARC workstation of the University of New Mexico and CICIDS2017 data set.The experiment results show that our method has good performance in intrusion detection for detection accuracy.
作者 吴渝 彭茂玲 钱仁飞 马哲峰 陈善雄 WU Yu;PENG Mao-ling;QIAN Ren-fei;MA Zhe-feng;CHEN Shan-xiong(Chongqing Police College, Chongqing 401331, China;Chongqing City Management College, Chongqing 401331, China;Ningbo Dafa Chemical Fiber Company Limited, Ningbo Zhejiang 315336, China;College of Computer and Information Science, Southwest University, Chongqing 400715, China)
出处 《西南师范大学学报(自然科学版)》 CAS 北大核心 2020年第9期139-146,共8页 Journal of Southwest China Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61303227) 重庆市自然科学基金项目(cstc2020jcyj-msxm2695) 中国博士后基金项目(2015M580765) 重庆市博士后科研项目(Xm2016041) 中央高校基本科研业务费项目(XDJK2018B020).
关键词 入侵检测 系统调用 非负矩阵分解 遗传规划 intrusion detection system call nonnegative matrix factorization genetic programming
  • 相关文献

参考文献6

二级参考文献45

  • 1麻秀范,张粒子.基于十进制编码的配网重构遗传算法[J].电工技术学报,2004,19(10):65-69. 被引量:75
  • 2龚俭,梅海彬,丁勇,魏德昊.多特征关联的入侵事件冗余消除[J].东南大学学报(自然科学版),2005,35(3):366-371. 被引量:13
  • 3Arnes A, Valeur F, Vigna G, et al. Using hidden markov models to evaluate the risks of intrusions//Proceedings of the Recent Advances in Intrusion Detection. Hamburg, Germany, 2006.. 145-164.
  • 4Haslum K, Moe M E G, Knapskog S J. Real-time intrusion prevention and security analysis of networks using HMMs// Proceedings of the 33rd IEEE Conference on Local Computer Networks. Montreal, Canada 2008.. 927-934.
  • 5Khreich W, Granger E, Miri A, et al. Adaptive ROC-based ensembles of HMMs applied to anomaly detection. Pattern Recognition, 2012, 45(1).. 208-230.
  • 6Rabiner L R. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989, 77(2): 257-286.
  • 7Arnes A, Sallhammar K, Haslum K, et al. Real-time risk assessment with network sensors and intrusion detection systems. Computational Intelligence and Security, 2005, 3802 : 388-397.
  • 8Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transac- tions on So:ltware Engineering, 1997, 23(4): 235-245.
  • 9Sendi A S, Dagenais M, Jabbarifar M, Couture M. Real time intrusion prediction based on optimized Alerts with Hidden Markov Model. Journal of Networks, 2012, 7(2): 311-321.
  • 10Ning P, Cui Y, Reeves D S. Constructing attack scenarios through correlation of intrusion alerts//Proceedings of the 9th ACM conference on Computer and Communications Security. New York, USA, 2002:245-254.

共引文献141

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部