期刊文献+

多聚类融合算法在频繁非法访问检测中的应用

Application of Multi-Clustering Ensembles Algorithm in Frequent Illegal Access Detection
下载PDF
导出
摘要 针对频繁非法访问的检查问题,提供了一种机器学习方法来检测登录场景中的频繁非法访问活动。通过特征工程的方法分析登录日志数据,筛选提取有效特征,再使用聚类方法对登录特征数据进行检测,分类出正常用户和异常用户。为了提高无监督识别算法的精度,提出了多聚类融合的检测算法,从多个聚类算法的角度,精确识别出登录日志中的频繁非法访问用户。实验结果证明,该方法可以更准确地提取登录场景中各项指标异常的用户,并可以扩展适应其他频繁非法访问场景。 For the inspection problem of frequent illegal accesses,a machine learning method is proposed to detect frequent illegal access in the login scenario.Relevant features are extracted and filtered from the login log data by feature engineering methods,after that,the clustering method is used to detect the login data and classify normal users and abnormal users.In order to improve the accuracy of unsupervised recognition algorithm,the detection algorithm of multi-clustering ensembles is proposed,which can more accurately identify frequent illegal access users from the perspective of multiple clustering algorithms.Experimental results indicate that the method can more accurately extract users with abnormal indicators in the login scenario and can be expanded to adapt to other frequent illegal access scenarios.
作者 甘迎辉 程永新 王梓 彭凯 GAN Yinghui;CHENG Yongxin;WANG Zi;PENG Kai(No.30 Institute of CETC,Chengdu Sichuan 610041,China;University of Electronic Science and Technology of China,Chengdu Sichuan 610054,China)
出处 《通信技术》 2023年第4期515-520,共6页 Communications Technology
关键词 非法访问 机器学习 多聚类融合 检测算法 illegal access machine learning multi-clustering ensemble detection algorithm
  • 相关文献

参考文献6

二级参考文献45

  • 1张华伟,王明文,甘丽新.基于随机森林的文本分类模型研究[J].山东大学学报(理学版),2006,41(3):5-9. 被引量:59
  • 2Han Jiawei Kamber M.数据挖掘-概念与技术[M].高等教育出版社,2002..
  • 3陈斌,冯爱民,陈松灿,李斌.基于单簇聚类的数据描述[J].计算机学报,2007,30(8):1325-1332. 被引量:18
  • 4HanJiawei KamberM.数据挖掘—概念与技术[M].高等教育出版社,2002..
  • 5Portnoy L, Eskin E,Stolfo S J.Intrusion Detection with Unlabeled Data Using Clustering. Philadelphia, PA:ln Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA,2001 ),2001.
  • 6Eskin E,Amold A,Prerau M A Geometric Framework for Unsupervied Anomaly Detection: Detecting Intrusions in Unlabeled Dala.CUCS Technical Report,2002.
  • 7Application of Data Mining to Intrusion Detection.http://www.isse.gmu.ed u/-csis/infs765/handouts/handout 12.pdf,2000.
  • 8Barbara D.ADAM:Detecting Intrusions by Data Mining.Proceedings of IEEE Workshop on Information Assurance and Security,2001.
  • 9Kdd99 Cup dataset.http://kdd.ics:uci.edu/databases/kddcup99/kddcup99.html, 1999.
  • 10Quinlan J R.C4.5:Programs for Machine Learning,1993.

共引文献222

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部