期刊文献+

一种基于半监督学习的入侵检测算法 被引量:4

Intrusion Detection Algorithm Based on Semi-supervised Learning
在线阅读 下载PDF
导出
摘要 针对无监督的入侵检测检测效率较低,而有监督入侵检测算法不能有效的检测异常攻击,提出一种半监督学习的入侵检测算法,新算法先用有标记数据进行初始聚类,然后利用初始聚类指导未标记数据聚类,最后使用K近邻算法对仍没有确定类别的未标示数据对异常进行检测,结果表明,改进后算法的效果优于无监督和有监督学习的入侵检测算法。 In view of the low detection rate of unsupervised intrusion detection algorithm, and the inefficacy of the su- pervised intrusion detection algorithms for unknown attacker, in this paper, an semi-supervised learning based intru- sion detection algorithm is proposed. In this algorithm, a small number of labeled samples is used to obtain the initial clustering model, which is used to guide the unlabeled data clustering. The unmarked data whose categories are not determined are clustered with K-nearest neighbor algorithm to detect abnormalithy, experiment results show that the improved algorithm has better performance than the intrusion detection algorithms based on unsupervised and supervised learning.
出处 《成都信息工程学院学报》 2012年第6期560-563,共4页 Journal of Chengdu University of Information Technology
关键词 计算机应用技术 数据挖掘 入侵检测 半监督学习 K近邻算法 applied computer technology data mining intrusion detection semi-supervised learning KNN
  • 相关文献

参考文献14

  • 1Denning D E. An intrusion detection model[ J ]. IEEE. Teans. on Software Engineering, 1987,13 (2) : 222 - 232.
  • 2A Blum, T Mitchell. Combining labeled and unlabeled data with co-training[ A]. Proceedings of the 1 th Annual Conference on Computational Learning Theory (COLT' 98) [ C]. Wisconsin, MI, 1998 : 92 - 100.
  • 3Hartung F, Kutter M. Multimedia watermarking techniques[C]//Proceedings of the IEEE, Special Issue on I- dentification and Protection of Multimedia Information, 1999,87 (7) : 1079 - 1107.
  • 4Giorgio Giacinto, Fabio Roli. Intrusion detection in computer networks by multiple classifier systems[C]. Pat- tern Recogni-tion, 2002, Proceedings. 16th International Conference on. 2002.
  • 5Aha D W, Kibler D, Albert M K. Instance- based learning algorithms [ J ]. Machine Learning, 1991,6 (13) : 37 - 66.
  • 6LI Rong, CUI Yan-mei HE Han, et al. Application of support vector machine combined with K-nearest neigh- bors in solar flare and solar proton events forecasting[J ]. Advances in Space Research, 2008,42:1469- 1474.
  • 7Aha D W. Lazy learning[ M]. Dordreeht: Kluwer Academic, 1997.
  • 8P E Hart. The condensed nearest neighbor rule[J]. IEEE Trans Inform Theory, 1968,14(3) :515 - 516.
  • 9K Fukunaga, P M Narendra. Abranch and bound algorithm for computing k-nearest neighbors[J ]. IEEE Trans Computers, 1975,24 (7) : 750 - 753.
  • 10J S Pan, Y L Qiao, S H Sun. A fast Knearest neighbors classification algorithm[J]. IEICE Trans Fundamen- tals, 2004, E87 - A(4) : 961 - 963.

二级参考文献13

  • 1赵莹,高隽,汪荣贵,胡静.一种新的广义最近邻方法研究[J].电子学报,2004,32(F12):196-198. 被引量:13
  • 2Lu Hongjun,IEEE Trans Knowledge Data Engineering,1996年,8卷,6期,957页
  • 3Han Jiawei,Proceedings of ACM SIGMOD International Conference’96 on Management of Data(SI,1996年,4页
  • 4Lu Hongjun,Preceedings of the 21th VLDB Confer- ence,1995年
  • 5DUNHAM M H.数据挖掘教程[M].郭崇慧,田凤占,勒晓明,等译.北京:清华大学出版社,2005.
  • 6HAN Jiawei,KAMBER M.数据挖掘概念与技术[M].范明,孟小峰,译.北京:机械工业出版社,2003:223-225.
  • 7GIUDIEI P.实用数据挖掘[M].袁方,王煜,王丽娟,译.北京:电子工业出版社,2004:53-55.
  • 8Flanagan J A. Unsupervised Clustering of Symbol Strings[C]//Proc. of Intl' Joint Conference on Neural Networks. Portland Oregon, USA: [s. n.]. 2003: 3250-3255.
  • 9Krishma K, Nurty M N. Genetic K-means Algorithm[J]. IEEE Trans.on System, 1999, 29(3): 433-439.
  • 10Kennedy J, Eberhart R C. Particle Swarm Optimization[C]//Proc. of IEEE International Conference on Neural Networks. Perth, Australia: [s. n.], 1995: 1942-1948.

共引文献36

同被引文献21

引证文献4

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部