期刊文献+

决策树与神经网络结合的入侵检测系统模型研究 被引量:2

Intrusion detection system model based on decision tree and neural network
在线阅读 下载PDF
导出
摘要 入侵检测系统是保证网络信息安全的有力手段,文中提出一种结合决策树和神经网络的入侵检测系统框架。决策树分类方法把数据集划分为正常数据和入侵数据,并作为训练集分别用神经网络进行训练,改善了系统的检测精度并提高了对未知数据的检测能力。离线训练后的系统可以实现网络数据的实时检测,通过实验证明了此系统很好的检测效果和自适应能力。 Intrusion detection system is an efficient method for information security. An intrusion detection system framework based on decision tree and neural network is proposed in this paper. Dataset can be labeled normal or intrusion based on decision tree, which are transferred to neural network as training dataset. After training of the neural network, IDS improved its accuracy and ability to detect new intrusion. IDS can detect intrusion online efficiently and adaptively in our experiment.
出处 《燕山大学学报》 CAS 2010年第1期85-89,共5页 Journal of Yanshan University
基金 河北省科技支撑计划资助项目(072135218)
关键词 入侵检测 决策树 神经网络 intrusion detection decision tree neural network
  • 相关文献

参考文献8

二级参考文献27

  • 1曾黄麟.粗集理论及其应用[M].重庆:重庆大学出版社,1998..
  • 2Bykova M, Ostermann S,Tjaden B.Detecting network intrusions via a statistical analysis of network packet characteristics[C]//Proc of the 33rd Southeastern Symp on System Theory.Athens,OH:IEEE,2001.
  • 3Yu L,Liu H.Efficient feature selection via analysis of relevance and redundancy[J].Journal of Machine Learning Research,2004, (5) : 1205-1224.
  • 4Knowledge discovel7 in databases DARPA archive[EB/OL].http:// www.kdd.ics.nci.edu/databases/kddcup99/task.html.
  • 5Wlodzislaw D,Tomasz W,Jacek B,et al.Feature selection and ranking filters[EB/OL]. ( 2003 ).http://metet.polsl.katowice.pl/-jbiesiada/prace/selekcj a/03 -Istambul.pdf.
  • 6Weka machine learning project[EB/OL].http://www.cs.waikato.ac.nz/-ml/index.html.
  • 7Stanifbrd-Chen S, Cheung S, Crawtbrd R, et al. GrIDS-A Graph Based Intrusion Detection System tbr Large Networks. In 19th National In~brmation Systems Security Conference Proceedings,1996-10:361-370.
  • 8Valdes A, Skinner K. An Approach to Sensor Correlation. In Recent Advances in Intrusion Detection (RAID 2000). Toulouse, France,2000-10.
  • 9Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. RAID 1999, 1999-06.
  • 10Han J, Kambr M. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers, 2001:279-333

共引文献139

同被引文献14

引证文献2

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部