期刊文献+

基于特征选取与树状Parzen估计的入侵检测 被引量:5

Intrusion detection based on feature selection and tree Parzen estimation
下载PDF
导出
摘要 针对目前网络空间安全形势快速变化带来的新风险和新挑战,提出一种基于相关性分析的特征选取和树状Parzen估计优化的入侵检测方法。首先,通过基于相关性分析的数据特征选取方法对数据维度进行压缩。其次,对原始数据集进行特征筛选,生成新的特征子集。最终,使用序列模型优化算法中的树状Parzen估计算法对随机森林算法进行模型优化。实验结果表明,相比其他应用机器学习算法的入侵检测方法,所提方法在提升综合性能的同时拥有更高的检测效率,有效地提升了入侵检测技术的实用性。 In response to the new risks and challenges bring about by the rapid changes in the current cyberspace security situation,an intrusion detection method optimized by feature selection based on correlation analysis and tree Parzen estimation(TPE)is proposed.Fistly,the data dimensions are compressed by the method of data feature selection based on correlation analysis.Secondly,feature filtering is performed on the original data set,and a new feature subset is generated.Finally,the random forest algorithm is optimized using the TPE algorithm based on sequential model-based global optimization.Experimental results show that the proposed method has higher detection efficiency while improving the overall performance compared with other intrusion detection methods using machine learning algorithms,and effectively improves the practicability of intrusion detection technology.
作者 金志刚 吴桐 JIN Zhigang;WU Tong(School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China)
出处 《系统工程与电子技术》 EI CSCD 北大核心 2021年第7期1954-1960,共7页 Systems Engineering and Electronics
基金 国家自然科学基金(71502125)资助课题。
关键词 网络安全 入侵检测 特征选取 树状Parzen估计 network security intrusion detection feature selection tree Parzen estimation
  • 相关文献

参考文献5

二级参考文献14

  • 1Christina Warrender, Stephanie Forrest, Barak Pearlmutter. Detecting intrsions using system calls: alternative data models [A].Proceedings of the 1999 IEEE Symposium on Security and Privacy [C]. IEEE Computer Society, 1999, 135 - 145.
  • 2RichardStevensW 尤晋元 译.UNIX环境高级编程[M].北京:机械工业出版社,2000..
  • 3.qmail 的工作原理[EB/OL].http:∥bbs. chinaunix. net/jh/14/66068.html,.
  • 4Ghosh Anup K, Aaron Schwartzbard, Michael Schatz. Reliable Software Technologies Corporaton[A]. Leaning Program Behavior Profiles for Intrusion Detection[C]. 2000.
  • 5雷镇.Linux系统调用列表[EB/OL].http:∥www-900.ibm.com/developerWorks /cn /linux /kernel /syscall /part 1/appendix . shtml,.
  • 6Denning D E.An intrusion detection model[J].IEEE Trans.On Software Engineering,1987,13(2):222-232.
  • 7Forres S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[J].In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy,Los Alamitos,CA:IEEE Computer Society Press 1994:120-128.
  • 8Sung A H,Mukkamala S.Identifying important features for intrusion detection using support vector machines and neural networks[C]//In Proceedings of the 2003 International Symposium on Applications and the Internet Technology,IEEE Computer Society Press,2003:209-216.
  • 9Helman P,Liepins G.Statistical foundations of audit trail analysis for the detection of computer Misuse[J].IEEE Transactions on Software Engineering,2000,19(9):886-901
  • 10http://www-cse.ucsd.edu/users/elkan/clresults.html[DB].

共引文献67

同被引文献51

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部