期刊文献+

基于随机森林的入侵检测分类研究 被引量:9

Research on Intrusion Detection Classification Based on Random Forest
下载PDF
导出
摘要 为了有效地检测网络的攻击行为,机器学习被广泛用于对不同类型的入侵检测进行分类,传统的决策树方法通常用单个模型训练数据,容易出现泛化误差大、过拟合的问题。为解决该问题,文中引入并行式集成学习的思想,提出基于随机森林的入侵检测模型,由于随机森林中每棵决策树都有决策权,因此可以很好地提高分类的准确性。利用NSL-KDD数据集对入侵检测模型进行训练和测试,实验结果表明,该模型的准确率可达99.91%,具有非常好的入侵检测分类效果。 In order to effectively detect the attack behavior of the network,the machine learning method are widely used to classify different types of network intrusion detection.The traditional decision tree methods usually use a single model to training data,which is prone to generalization errors and is prone to over-fitting.To solve this problem,this paper introduces the idea of parallel integrated learning,and proposes an intrusion detection model based on random fo-rest.Since each decision tree in the random fo-rest has decision-making power,it can improve the accuracy of classification very well.By using the NSL-KDD data set to train and test the intrusion detection model,the experimental results show that the accuracy rate can reach 99.91%,which shows that the model has a very good intrusion detection classification effect.
作者 曹扬晨 朱国胜 祁小云 邹洁 CAO Yang-chen;ZHU Guo-sheng;QI Xiao-yun;ZOU Jie(School of Computer and Information Engineering,Hubei University,Wuhan 430062,China;School of Chemistry and Chemical Engineering,Hubei University,Wuhan 430062,China)
出处 《计算机科学》 CSCD 北大核心 2021年第S01期459-463,共5页 Computer Science
基金 赛尔网络下一代互联网技术创新项目 基于Cloud VR和IPv6的特殊作业教育培训系统项目(NGII20180507)。
关键词 入侵检测 机器学习 随机森林 决策树 Intrusion detection Machine learning Random forest Decision tree
  • 相关文献

参考文献5

二级参考文献37

  • 1王晓鹏.TCP/IP下的Socket及Winsock通信机制[J].航空计算技术,2004,34(2):126-128. 被引量:30
  • 2陈友,沈华伟,李洋,程学旗.一种高效的面向轻量级入侵检测系统的特征选择算法[J].计算机学报,2007,30(8):1398-1408. 被引量:46
  • 3Modi C, Patel D, Borisaniya B, et al. A survey of intrusion de- tection techniques in cloud [ J ]. Journal of Network and Com- puter Applications ,2013,36( 1 ) :42-57.
  • 4Lee S W, Yu F. Securing KVM-based cloud systems via virtu- alization introspection[ C]//Proc of 47th Hawaii international conference on system sciences. Hawaii: IEEE,2014: 5028- 5037.
  • 5Mahmood Z, Agrawal C, Hasan S S, et al. Intrusion detection in cloud computing environment using neural network [ J]. In- ternational Journal of Research in Computer Engineering & E- lectronics ,2012,1 ( 1 ) : 19-22.
  • 6Shelke M P K, Sontakke M S, Gawande A D. Intrusion detec- tion system for cloud computing [ J ]. International Journal of Scientific & Technology Research,2012,1 (4) :67-71.
  • 7Mazzariello C, Bifulco R, Canonico R. Integrating a network ids into an open source cloud computing environment [ C ]// Proc of sixth international conference on information assurance and security. Atlanta, GA : IEEE,2010:265-270.
  • 8Roesch M. Snort homepage[ EB/OL]. (1998-08-16) [ 1998- 10-04]. http://www, snort, org/.
  • 9Hamad H, A1-Hoby M. Managing intrusion detection as a service in cloud networks [ J ]. International Journal of Comput- er Applications ,2012,41 ( 1 ) :35-40.
  • 10Yi X, Wu P, Dai D, et al. Intrusion detection using BP opti- mized by PSO [ J ]. International Journal of Advancements in Computing Technology ,2012,4 ( 2 ) :268-274.

共引文献78

同被引文献83

引证文献9

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部