期刊文献+

可进化的入侵检测系统的模糊分类器研究 被引量:2

Study of Evolving Fuzzy Classifiers for Intrusion Detection
在线阅读 下载PDF
导出
摘要 由于计算机网络中的正常行为和异常行为难以很好界定,所以许多入侵检测系统经常产生误报警。使用模糊逻辑推理方法,入侵检测系统的误报率则会明显降低,可以在入侵检测系统中,使用一套模糊规则和作用在该集合上的模糊推理算法,来判断是否发生了入侵事件。这种方法面临的主要问题是要有一个针对入侵检测的好的模糊算法。该文提出了一种使用遗传算法产生模糊分类器,以检测误用和入侵事件。主要思想是生成两个进化规则子集合,一个用于描述正常行为,一个用于描述异常行为。其中,正常行为规则进化信息来自正常使用时的操作行为,异常行为规则进化信息来自计算机网络受到入侵时的操作行为。 The boundaries of the normal and the abnormal behaviors in networked computers are hard to well defined.So many intrusion detection systems may generate false alarms.However,with fuzzy logic,the false alarm rate can be reduced;a set of fuzzy rules can be used to define the normal and abnormal behavior in a computer network,and a fuzzy inference algorithm can be applied over such rules to determine when an intrusion is in progress.The main problem with this approach is to generate good fuzzy classifiers to detect intrusions.This paper proposes a technique to generate fuzzy classifiers using genetic algorithms that can detect anomalies and intrusions.The main idea is to evolve two rules,one for the normal class and other for the abnormal class.
作者 周国良
出处 《计算机工程与应用》 CSCD 北大核心 2004年第30期157-159,共3页 Computer Engineering and Applications
关键词 入侵检测 模糊分类 规则生成 遗传算法 intrusion detection,fuzzy classification,rule generation,genetic algorithms
  • 相关文献

参考文献13

  • 1R Heady,G Luger,A Maccabe et al.The Architecture of a Networklevel Intrusion Detection System[R].Technical report,CS90-20,Dept of Computer Science,University of New Mexico,Albuquerque,NM 87131
  • 2Edward Amoroso. Intrusion detection. Intrusion.net Books, 1999-01
  • 3Julia Allen et al. State of the practice of intrusion detection technologies[R].Technical Report CMU/SEI99 -TR-028,ESC-99-028,Carnegie Mellon,Software Engineering Institute,Pittsburgh,Pennsylvania, 1999
  • 4Stefan Axelsson.Intrusion detection systems:A survey and taxonomy[R].Technical Report No 99-15,Dept of Computer Engineering,Chalmers University of Technology,Sweden,2000-03
  • 5Jai Sundar et al.An architecture for intrusion detection using autonomous agents[R].Tech Rep 98/05,Purdue University,1998
  • 6Mark Crosbie. Applying genetic programming to intrusion detection[C].In:Proceedings of the AAAI 1995 Fall Symposium series,1995-11
  • 7Wenke Lee. Mining audit data to build intrusion detection models[C].In:Proc Int Conf Knowledge Discovery and Data Mining(KDD′98),1998: 66~72
  • 8Yingjiu Li et al.Enhancing profiles for anomaly detection using time granularities. Center for secure information systems. To appear in Journal of Computer Sccurity,2002
  • 9Susan Bridges,Rayford Vaughn. Fuzzy data mining and genetic algorithms applied to intrusion detection[C].In:Proceedings twenty third National Information Security Conference,2000
  • 10Steve Hofmeyr et al. Intrusion detection using sequences of systems call[J].Journal of Computer Security, 1998; 6:151~180

同被引文献15

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部