期刊文献+

基于多神经网络的入侵检测系统模型研究

Research on model of Intrusion Detection System based on multi-neural network
在线阅读 下载PDF
导出
摘要 为了进一步提高入侵检测系统的检测性能,提出一种新型的基于多神经网络的入侵检测系统模型IDSMN。该模型引入多神经网络和模糊理论,基本思想是将网络数据集分成不同类型的子集,在不同子集上训练形成不同的子神经网络,然后用模糊理论进行多神经网络非线性融合,形成最优判断。 In order to improve the detection performance of Intrusion Detection System, it was presented a new model of Intrusion Detection System based on multi-neural network. The multi-neural network and fuzzy integral were used in the model. The basic idea was to divide network dataset into several sub-datasets according to different data attributes, train on different sub-datasets and construct different sub-neural networks separatelyf-then nonlinearly combine the results from multiple sub-neural networks by fuzzy integral, at last the System would determine class.
作者 李波
出处 《铁路计算机应用》 2009年第7期42-44,共3页 Railway Computer Application
关键词 多神经网络 入侵检测 模糊理论 数据集 multi-neural network intrusion detection fuzzy integral dataset
  • 相关文献

参考文献2

二级参考文献15

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2米歇尔.机器学习[M].北京:机械工业出版社,2003.
  • 3Schapire R E.The Strength of Weak Learn Ability[J].Machine Learning,1990,5(2):197-227.
  • 4Breiman L.Bagging Predictors[J].Machine Learning,1996,24(2):123-140.
  • 5Turner K,Gosh J.Error Correlation and Error Reduction in Ensemble Classifiers[R].Texas:Dept.of ECE,University of Texas,1996.
  • 6Partridge D,Yates W B.Engineering Multiversion Neural-Net Systems[J].Neural Computation,1998,8(4):869-893.
  • 7Blake C L,Merz C J.UCI Repository of Machine Learning Databases[EB/OL].http://www.ics.uci.edu/~mlearn/MLRepository.html,1998.
  • 8Ludmila I.Kuncheva.How Good are Fuzzy If-Then Classifiers[J].IEEE Transactions on Systems,Man,and Cybernetics,2000,30(4):501-509.
  • 9Wierzechon S T.On Fuzzy Measure and Fuzzy Integral[C].Fuzzy Information and Decision Processes,New York:North-Holland,1982:78-86.
  • 10Lee W,Stolfo S J.A framework for constructing features and models for intrusion detection systems [J].ACM Transactions on Information arid System Security,2000,3(4).227-261.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部