期刊文献+

基于阈值优化的CDRM-SVM入侵检测算法 被引量:1

Intrusion detection algorithm based on CDRM-SVM with optimized threshold
在线阅读 下载PDF
导出
摘要 为了提高中心距离比值法预选取支撑矢量的效率,降低支撑矢量机的训练时间,引入自适应动态克隆算法对中心距离比值法的阈值进行优化,并将该算法应用于入侵检测中,提出了基于阈值优化的CDRM-SVM入侵检测算法.算法首先利用自适应动态克隆算法对中心距离比值法中的阈值进行优化,获得理想的阈值,从而可以提取出包含全部支撑矢量的边界矢量集,然后使用边界矢量集代替训练样本集进行支持矢量机的训练,大幅度减少了训练样本的数量,使支持矢量机的训练速度显著提高.同时,由于边界矢量集中包含了支撑矢量,因此,支撑矢量机的分类能力没有受到影响.采用KDDCUP 99数据集进行试验,试验结果表明:与传统方法相比,在保证性能的情况下,所提算法能够有效地降低支持向量机的训练时间. To improve the efficiency of support vector extraction using center distance ratio method (CDRM) and reduce the training time of support vector machine (SVM), the adaptive dynamic clone selection algorithms is introduced and used to optimize the threshold in center distance ratio method. Then, the algorithm is used in intrusion detection and the intrusion detection algorithm based on CDRM-SVM with optimized threshold is proposed. First, the threshold is optimized by the adaptive dynamic clone selection algorithm and a perfect threshold is obtained. Thereby the border vectors set including all of support vector is extracted. Then SVM is trained by substituting the border vector set for training set. The method reduces training samples greatly and advances training speed markedly. The classification capability of support vector machines is not affected because the border vectors contain support vectors. Experimental results using the knowledge discovery and data mining cup 1999 (KDDCUP99) datasets indicate that the improved algorithm reduces the training time of SVM effectively comparing with the conventional method under the same detection performance condition.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第A01期68-72,共5页 Journal of Southeast University:Natural Science Edition
基金 华北科技学院校内基金资助项目(2008-B-12)
关键词 入侵检测 克隆选择 支撑矢量 中心距离比值 网络安全 intrusion detection clone selection support vector center distance ratio network security
  • 相关文献

参考文献8

  • 1Kim J W. Integrating artificial immune algorithms for intrusion detection [D]. London: University of London, 2002.
  • 2Hofmeyr S A. The implications of immunology for secure systems design [J]. Computers & Security, 2004, 23 (6): 453-455.
  • 3Zhang Chunlin, Jiang Ju, Kamel Mohamed. Intrusion detection using hierarchical neural networks [J]. Pattern Recognition Letters, 2005, 26(6):779-791.
  • 4Fugate M, Gattiker J R. Computer intrusion detection with classification and anomaly detection using SVMs[J]. Int J Pattern Recognition Artif Intell, 2003, 17 (3): 441-458.
  • 5Kim D S, Nguyen H N, Ohn S Y, et al. Fusions of GA and SVM for anomaly detection in intrusion detection system[C]// Advances in Neural Networks. Springer-Verlag, 2005:415-420.
  • 6焦李成,张莉,周伟达.支撑矢量预选取的中心距离比值法[J].电子学报,2001,29(3):383-386. 被引量:48
  • 7Du Haifeng, Jiao Licheng, Wang Sunan. Clonal operator and antibody clone algorithms[C]//Proceedings of the First International Conference on Machine Learning and Cybernetics. Beijing, 2002:506-510.
  • 8Stolfo Salvatore J, Fan Wei, Lee Wenke, et al. Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection[EB/OL]. (1999)[2008-05-20]. http://kdd. ics. uci. edu/databases/kddcup99/task. html.

二级参考文献2

共引文献47

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部