期刊文献+

基于机器学习的入侵检测方法研究综述 被引量:1

A Survey on Machine Learning Approaches for Developing Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统(Intrusion Detection System,IDS)主要用于检查主机或系统的活动,保护系统和数据框架免受恶意攻击.IDS能够跟踪网络中运行的硬件和软件的状态,以防恶意活动窃取数据.机器学习模型的应用可以使得IDS获得较低的误报率和较高的识别率.机器学习方法能够智能地识别正常和恶意流量,具有较高的识别精度.基于此,笔者重点介绍了多种基于机器学习的侵检测系统,通过对现有文献的广泛研究和调查,可以改进和创建高效入侵检测系统。 Intrusion detection system is mainly used to protect the system and data frame from malicious attacks.It checks the activity of the host or system.IDS tracks the status of hardware and software running in the network to prevent malicious activities from stealing data.The application of machine learning model can obtain lower false alarm rate and higher recognition rate.Machine learning method can intelligently identify normal and malicious traffic,and has high recognition accuracy.This paper focuses on the introduction of a variety of intrusion detection systems based on machine learning.Through extensive research and investigation of the existing literature,the gap between improving and creating efficient intrusion detection system can be determined.
作者 刘功平 高玉琢 LIU Gongping;GAO Yuzhuo(College of Information Engineering,Ningxia University,Yinchuan Ningxia 750021,China)
出处 《信息与电脑》 2021年第10期34-37,共4页 Information & Computer
关键词 入侵检测系统 机器学习 异常行为 数据集 intrusion detection system machnie learning anomaly data sets
  • 相关文献

参考文献3

二级参考文献47

  • 1史长琼,易昂.基于多决策树算法的网络入侵检测[J].计算机工程与设计,2004,25(4):518-519. 被引量:4
  • 2张琨,许满武,刘凤玉,张宏.基于支持向量机的异常入侵检测系统[J].计算机工程,2004,30(18):43-45. 被引量:7
  • 3孙宏伟,邹涛,田新广,张尔扬.基于机器学习的入侵检测方法实验与分析[J].计算机工程与设计,2004,25(5):694-696. 被引量:8
  • 4边肇祺 张学工.模式识别[M](第2版)[M].北京:清华大学出版社,1999..
  • 5LEE W,FAN W,MILLER M,et al.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1):5-22.
  • 6CHEN S S,CHEUNG S,CRAWFORD R,et al.GrIDS-a graph based intrusion detection system for large networks:the 19th National Information Systems Security Conference(NISSC)[C].Baltimore:[s.n.],1996:361-370.
  • 7NORTHCUTT S.Network intrusion detection:an analyst's handbook[M].[S.l.]:New Riders,1999.
  • 8TSENG C Y,BALASUBRAMANYAM P KO C,LIMPRASITTIPORN RR,et al.A specification-based intrusion detection system for AODV:proceedings of the 2003 ACM Workshop on Security of Ad hoc and Sensor Networks(SASN'03)[C].Farirfax Virginia:[s.n.],2003:125-134.
  • 9VIGNA G,KEMMERER R.NetSTAT:a network-based intrusion detection system:proceedings of the 14th Annual Computer Security Applications Conference[C].Scottsdale:[s.n.],1998.
  • 10FORREST S,PERELSON A,ALLEN L,et al.Self-nonself discrimination in a computer:proceedings of IEEE Symp.on Research in Security and Privacy[C].[S.l.]:[s.n.],1994.

共引文献78

同被引文献10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部