期刊文献+

基于对支持向量机的多类分类算法在入侵检测中的应用 被引量:15

Application of multi-class classification algorithm based on twin support vector machine in intrusion detection
在线阅读 下载PDF
导出
摘要 针对基于传统支持向量机(SVM)的多类分类算法在处理大规模数据时训练速度上存在的弱势,提出了一种基于对支持向量机(TWSVM)的多类分类算法。算法结合二叉树SVM(BT-SVM)多类分类思想,通过在二叉树节点处构造基于TWSVM的分类器来达到分类目的。为减少二叉树SVM的误差累积,算法分类前首先通过聚类算法得到各类的聚类中心,通过比较各聚类中心之间的距离来衡量样本的差异以决定二叉树节点处类别的分离顺序,最后将算法用于网络入侵检测。实验结果表明,所提算法不仅保持了较高的检测精度,在训练速度上还表现出一定优势,尤其在处理稍大规模数据时,这种优势更为明显,是传统二叉树SVM多类分类算法训练速度的近两倍,为入侵检测领域大规模数据处理提供了有效参考价值。 The muhi-class classification algorithms based on traditional Support Vector Machine (SVM) are weak on training speed when dealing with large-scale data. To solve the problem, this paper proposed a muhi-class classification algorithm based on Twin Support Vector Machine ( TWSVM). It combined binary tree multi-class classification and constructed classifiers based on TWSVM on the nodes of binary tree. To reduce the error accumulation of Binary Tree SVM ( BT-SVM), it firstly got clustering centers through the clustering algorithm, and then compared the distances between them to determine the separation sequence of classes. Finally, it was applied to network intrusion detection. The experimental results show that the proposed algorithm has higher detection accuracy and certain advantages on training speed especially for large-scale data. The training speed is approximately two times faster than that of the traditional BT-SVM algorithm. It is valuable for large-scale data processing in the field of network intrusion detection.
出处 《计算机应用》 CSCD 北大核心 2013年第2期426-429,共4页 journal of Computer Applications
关键词 对支持向量机 多类分类 二又树支持向量机 入侵检测 Twin Support Vector Machine (TWSVM) multi-class classification Binary Tree Support Vector Machine (BT-SVM) intrusion detection
  • 相关文献

参考文献15

  • 1饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:137
  • 2HOMG S J,SU M Y,CHEN Y H. A novel intrusion detection system based on hierarchical clustering and support vector machines[J].Expert Systems with Applications,2011,(01):306-313.
  • 3AMBWANI T. Multi class support vector machine implementation to intrusion detection[A].Washington,DC:IEEE Computer Society,2003.2300-2305.
  • 4XU X,WANG X N. An adaptive network intrusion detection method based on PCA and support vector machines[A].Beilin:Springer-Verlag,2005.696-703.
  • 5SHON T,SEO J,MOON J. SVM approach with a genetic algorithm for network intrusion detection[A].Beilin:Springer-Verlag,2005.224-233.
  • 6VAPNIK V N. Statistical learning theory[M].Berlin:springer-verlag,1998.123-167.
  • 7HSU C W,LIN C J. A comparison of methods for multiclass support vector machines[J].IEEE Transactions on Neural Networks,2002,(02):415-425.
  • 8WESTON J,WATKINS C. Multi-class support vector machines[A].Mobile,Alabama:Factor Press,1999.233-265.
  • 9PLATT J C,CRISTIANINI N,SHAWE-TAYLOR J. Large margin DAGs for multiclass classification[A].Cambridge,MA:The MIT Press,2000.547-553.
  • 10SUYKENS J A K,VANDEWALLE J. Least squares support vector machine classifiers[J].Neural Processing Letters,1999,(03):293-300.

二级参考文献31

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 7Vapnik V N. The nature of statistical learning theory. New York:Springer, 2000.
  • 8Burges C J C. A tutorial on support vector ma- chines for pattern recognition. Data Mining and knowledge Discovery, 1998, 2(2): 121-167.
  • 9Mangasarian O L, Musicant D R. Lagrangian support vector machines. Journal of Machine Learning Research, 2001, 1:161-177.
  • 10Lee Y J, Mangasarian O L. SSVM: A smooth support vector machine for classification. Com- putational Optimization and Applications, 2001, 20(1) : 5-22.

共引文献163

同被引文献151

引证文献15

二级引证文献189

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部