期刊文献+

一种融合Kmeans和KNN的网络入侵检测算法 被引量:42

Hybrid Kmeans with KNN for Network Intrusion Detection Algorithm
在线阅读 下载PDF
导出
摘要 网络入侵检测算法是网络安全领域研究的热点和难点内容之一。目前许多算法如KNN、TCMKNN等处理的训练样本集都比较小,在处理大样本集时仍然非常耗时。因此,提出了一种适应大样本集的网络入侵检测算法(Cluster-KNN算法)。该算法分为离线数据预处理(数据索引)和在线实时分类两个阶段:离线预处理阶段建立大样本集的聚簇索引;在线实时分类阶段则利用聚簇索引搜索得到近邻,最终采用KNN算法得出分类结果。实验结果表明:与传统的KNN算法相比,Cluster-KNN算法在分类阶段具有很高的时间效率,同时在准确率、误报率和漏报率方面与其它同领域入侵检测方法相比也具有相当的优势。Cluster-KNN能够很好地区分异常和正常场景,且在线分类速度快,因而更适用于现实的网络应用环境。 Network intrusion detection algorithm is one of the hot and difficult topics in the field of network security research.At present,many algorithms like KNN and TCMKNN,which process relatively small data samples,are still very time-consuming when processing large scale date set.Therefore,this paper put forward a hybrid algorithm (ClusterKNN),which is adaptive to large scale data set.The algorithm is divided into the offline data preprocess phase(data indexing) and the online real-time classification phase.The offline phase establishes the cluster index for the large data set.Then the online phase uses the index to search neighbors,and finally outputs the result by KNN algorithm.The experimental results show that compared with the traditional KNN algorithm,Cluster-KNN algorithm has high time efficiency in the classification phase,and it has considerable advantages as well compared to intrusion detection methods of the same field in the accuracy rate,false positive rate,false negative rate and other aspects.Cluster-KNN can clearly distinguish the abnormal and normal scenes,and it has a high online classification speed.Thus,it is more suitable for the real network application environment.
出处 《计算机科学》 CSCD 北大核心 2016年第3期158-162,共5页 Computer Science
基金 广东省教育部产学研结合项目(2009B090300326) 华南师范大学研究生科研创新基金项目资助
关键词 网络入侵检测 Kmeans KNN KDDCUP99 Network intrusion detection Kmeans KNN KDDCUP99
  • 相关文献

参考文献2

二级参考文献21

  • 1史美林,钱俊,许超.入侵检测系统数据集评测研究[J].计算机科学,2006,33(8):1-8. 被引量:24
  • 2祖宝明,詹永照,卿林.一种针对MANET入侵检测Agent分布的分簇方法[J].微计算机信息,2007,23(05X):41-43. 被引量:1
  • 3Bykova M,Ostermann S,Tjaden B.Detecting network intrusions via a statistical analysis of network packet characteristics//Proceedings of the 33rd Southeastern Symposium on System Theory.Ohio,Athens,2001:309-314
  • 4Lee W,Stolfo S J.A framework for constructing features and models for intrusion detection systems.ACM Transactions on Information and System Security(TISSEC),2000,3(4):227-261
  • 5Barbarra D,Couto J,Jajodia S,Popyack L,Wu N.ADAM:Detecting intrusions by data mining//Proceedings of the 2001IEEE,Workshop on Information Assurance and Security.West Point,NY,USA,2001:11-16
  • 6Tamas A.IDDM:Intrusion detection using data mining techniques.Salisbury,Australia:DSTO Electronics and Surveillance Research Laboratory:Technical Report DSTO-GD-0286,2001
  • 7Luo J,Bridges S M.Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection.International Journal of Intelligent Systems,2000,15(8):687-704
  • 8Lippmann R P,Cunningham R K.Improving intrusion detection performance using keyword selection and neural networks.Computer Networks,2000,34(4):597-603
  • 9Eskin E,Arnold A,Prerau M,Portnoy L,Stolfo S P.A geometric framework for unsupervised anomaly detection:Detecting intrusions in unlabeled data//Barbara D,Jajodia S eds.Applications of Data Mining in Computer Security.Boston:Kluwer Academic Publishers,2002:78-99
  • 10Mukkamala S,Janoski G,Sung A H.Intrusion detection:Support vector machines and neural networks//Proceedings of the IEEE International Joint Conference on Neural Networks.Honolulu,USA,2002:1702-1707

共引文献153

同被引文献347

引证文献42

二级引证文献269

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部