期刊文献+

一种面向新型入侵的获取和分类方法

A Method of the Capture and Classification of New Intrusions
在线阅读 下载PDF
导出
摘要 针对网络异常检测方法对新型入侵提供信息不足的缺点,提出一种面向新型入侵的获取和分类方法.首先,通过异常检测方法捕获入侵,然后利用匹配过滤机制筛除已知入侵,最后将获取的新型入侵作为聚类模块的输入,通过聚类及提出的类别获取算法对新型入侵做进一步分类匹配,从而获得其类别信息.最后,采用KDDCUP99数据集进行实验仿真,结果表明该检测方法具有较好的检测率和较低的误报率,并且该方法对于识别并分类新型入侵是有效的. In view of less useful information for new intrusions that can be obtained by anomaly detection, a method of the capture and classification of new intrusion is proposed. First, an anomaly intrusion detection meth od is used to find intrusions. Second, pattern matching plays a role in filtering out the known intrusions, and the remaining new intrusions are regarded as the input to clustering module, through which further classification is carried out. As a result, the valid information about its class is obtained. Finally, based on the experiment simu- lation, which uses data set KDDCUP99, the results show that the detection method has a better detection rate and low false alarm rate, and that the method to identify and classify the new intrusions is valid.
出处 《常熟理工学院学报》 2012年第8期103-108,共6页 Journal of Changshu Institute of Technology
关键词 异常检测 分类映射 信息获取 anomaly detection classification map information acquisition
  • 相关文献

参考文献8

  • 1Shelly Xiaonan Wu, Wolfgang Banzhaf. The use of computational intelligence in intrusiondetection systems: A review. [J]. Applied Soft Computing, 2010, 10: 1-35.
  • 2Chih-Fong Tsai a, Yu-Feng Hsu b, Chia-Ying Lin c, et al. Intrusion detection by machine learning:A review[J]. Expert Systemswith Applications, 2009, 36:11994-12000.
  • 3WEI Yu-xin, WU Mu-qing. KFDA and clustering based muhiclass SVM for intrusion detection[J]. The Journal of China University of Posts and Telecommunications,.2008, 15(1): 123-128.
  • 4Taeshik Shon, Jongsub Moon. A hybrid machine learning approach to network anomaly detection[J]. Information Sciences, 2007, 177: 3799-3821.
  • 5Rachid Beghdad. Critical study of neural networks in detecting intrusions[J]. Computers & Security, 2008, 27(5-6): 168-175.
  • 6Giacinto G, Perdisci R, Rio M D, et al. Intrusion detection in computer networks by a modular ensemble of one-class classifiers [J]. Information Fusion, 2008, 9(1): 69-82.
  • 7Kayaeik H G, Zincir-Heywood A N, Heywood M I, et al. On the Capability of an SOM based Intrusion Detection System[C]. 2003 In- ternational Joint Conference on Neural Networks, Oregon, USA, 2003: 1808-1813.
  • 8Pfahringer B. Winning entry of the kddcup99 classifier learning contest[EB/OL], http://www.acm.org/sigs/sigkdd/kddcup/, 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部