期刊文献+

基于Boosting算法的入侵检测 被引量:1

Intrusion Detection Based on Boosting Algorithm
在线阅读 下载PDF
导出
摘要 提出一种基于Boosting算法的入侵检测方法。先用神经网络初步确定一个入侵检测函数,在此基础上,利用Boosting方法构造一个基于神经网络的入侵检测函数序列,然后以一定的方式将它们组合成一个加强的总检测函数,据此进行入侵检测。实验结果显示,这种方法明显提高了检测性能。 This paper presents a new algorithm based on Boosting for intrusion detection. Firstly, it builds a function for intrusion detection using neural network, then uses boosting algorithm and builds a serials of function based on the neural network. At last, a final function based on boosted combination of those functions is found, which is applied in intrusion detection. Experimen tresults show good detective performance of the algorithm.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第11期98-100,共3页 Computer Engineering
基金 国家自然科学基金资助项目(79816101)
关键词 入侵检测 神经网络 BOOSTING算法 Intrusion detection Neural network Boosting algorithm
  • 相关文献

参考文献10

  • 1[1]Bykova M, Ostermann S, Tjaden B. Detecting Network Intrusions via a Statistical Analysis of Network Packet Characteristics. In: Proceedings of the 33rd Southeastern Symposium in System Theory, 2001
  • 2[2]Jackson K, DuBois D, Stalling C. An Expert System Application for Network Intrusion Detection. Proceedings of the 14th National Compu- ter Security Conference, 1991-10: 215-225
  • 3[3]Bonifacio J M. Neural Networks Applied in Intrusion Detection Systems. Proc.of the IEEE World Congress on Comp.Intell.(WCCI98), 1998
  • 4[4]Song R S,Qian G, Chen B. A Wavelet Neural Network-based Intrusion Detection Model[A]. IFIPSEC2000: Information Security[C],Beijing: International Acade- mic Process,2000:109-112
  • 5[5]Lee S C, Heinbuch D V. Training a Neural-network Based Intrusion Detector to Recognize Novel Attacks.IEEE Trans.on Systems,Man,and Cybernetics, Part A, 2001: 294-299
  • 6[6]Keams M, Valiant L G. Learning Boolean Formulae or Factoring. Technical Report TR-1488,Cambridge,MA:Havard University Aliken Computation Laboratory,1988
  • 7[7]Keams M,Valiant L G.Crytographic Limitation on Learning Boolean Formulae and Finite Automata.In:Proceedings of the 21st Annual ACM Symposium on Theory of Computing,New York,NY:ACM press,1989: 433-444
  • 8[8]Schapire R E.The Strength of Weak Leamability.Machine Learning, 1990,(5):197-227
  • 9[9]Freund Y.Boosting a Weak Algorithm by Majority.Information and Computation, 1995,121(2):256-285
  • 10[10]Freund Y, Schapire R E.A Decision-theoretic Generalization of Online Learning and an Application to Boosting.Journal of Computer and System Sciences, 1997, 55(1):119-139

同被引文献6

  • 1Anderson J E Computer Security Threat Monitoring and Surveillance[R]. James E Anderson Company, 1980-04.
  • 2Han Sangjun, Cho Sungbae. Detecting Intrusion with Rule-based Integration of Multiple Models[J]. Computers & Security, 2003, 22(7): 613-623.
  • 3Gonzailez A, Perez R. Completeness and Consistency Conditions for Learning Fuzzy Rules[J]. Fuzzy Sets and Systems, 1998, 96(1): 37-51.
  • 4KDD99. KDD99 Cup Dataset[Z]. [2006-10-10]. http://kdd.ics.uci. edu/databases/kddcup99/kddcup99.html.
  • 5夏利民,戴汝为.基于Boosting模糊分类的滚动轴承故障诊断[J].模式识别与人工智能,2003,16(3):323-327. 被引量:14
  • 6陈望斌,王力生,廖根为.基于序列模式挖掘的入侵检测技术研究[J].小型微型计算机系统,2004,25(5):878-881. 被引量:11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部