期刊文献+

基于无监督聚类支持向量机的入侵检测方法研究 被引量:4

A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machines
在线阅读 下载PDF
导出
摘要 提出了一种将无监督聚类和支持向量机相结合的新的入侵检测方法。算法具有无监督聚类速度快和支持向量机精度高的优点,其基本思想是通过将网络数据包和聚类中心的比较确定是否需要进一步的采用支持向量机进行分类,从而减少了通过支持向量机的数据量,达到速度与精度的统一。实验采用KDD99的测试数据,结果表明,该方法能够有效的检测网络数据中的已知和未知入侵行为。 An intrusion detection algorithm based on unsupervised clustering(UC) and support vector machine(SVM) is presented via combining the fast speed of UC and the high accuracy of SVM.The basic idea of the algorithm is to decide whether to utilize SVM classifier or not by comparing the distances between the network packets and the cluster centers.So the number of packets going through SVM reduces.Therefore,we can get a tradeoff between the speed and accuracy in the detection.Using KDD99 data sets,the experiment result shows that this approach can detect intrusions efficiently in the network connections.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第18期4-7,57,共5页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:90104005 90204011) 西安电子科技大学计算机网络与信息安全教育部重点实验室开放基金资助课题
关键词 入侵检测 数据挖掘 无监督聚类 支持向量机 intrusion detection, data mining, unsupervised clustering, support vector machines
  • 相关文献

参考文献9

  • 1Ghosh A K.Leaming Program Behavior Profiles for Intrusion Detection. 1999
  • 2Eskin E,Arnold A et al.A Geometric Framework for Unsupervised Anomaly Detection:Detecting Intrusions in Unlabeled Data.Data Mining for Security Applications(DMSA-2002),Kluwer,2002
  • 3Mukkamala S,Janowski Get al.Identifying Important Features For Intrusion Detection Using Support Vector Machines and Neural Networks[C].In:Applications and the Intemet,Proceedings,2003 Symposium,2003:209-216
  • 4饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:137
  • 5Chatz A,Tuzhilin A.What Makes Patterns Interesting in Knowledge Discovery Systems[J].IEEE Transactions on Knowledge and Data Engineering, 1996-06: 970-974
  • 6Vapnik V.The Nature of Statistical Learning Theory[M].New York,NY: Springer-Verlag, 1995
  • 7Nell C,John S.An Introduction to Support Vector Machines and other kernel-based learning methods[M].Cambridge University Press,2000
  • 8Scholkopf B,Platt J C et al.Estimating the support of a high-dimensional distribution[J].Neural Computation,2001 ; 13(7) : 1443-1471
  • 9http://kdd.ics.uci.edu/databases/kddcup99/task.html

二级参考文献6

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.

共引文献136

同被引文献36

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部