期刊文献+

基于支持向量机的异常检测 被引量:5

Anomaly Detection Based on SVM
在线阅读 下载PDF
导出
摘要 提出一种使用支持向量机 (SVM)进行计算机系统实时异常检测的方法 ,内容涉及到一种对支持向量机方法的改进算法、对数据预处理的方法及SVM核函数的选取 .试验结果表明采用这一算法进行入侵检测具有准确率高、计算简单、占用的存储空间小等优点 . A key component of computer security techniques, intrusion detection has gotten more and more attention. An overview of our research on anomaly detection is presented, which uses system call traces as audit data. It is focused on issues related to constructing a support vector machine(SVM) for detecting intrusion or misuse of computers, and introduce an improved algorithm for SVM. A method for the pretreatment of audit data is given, and the choice of kernel function is discussed. To improve performance, the sequential minimal optimization(SMO) as the update algorithm for the SVM is used. This method is not only useful in theory, but also can be used in practice to monitor the computer system in real time.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2003年第5期599-605,共7页 JUSTC
关键词 入侵检测 异常检测 支持向量机(SVM) 系统调用序列 intrusion detection anomaly detection support vector machine(SVM) system calls trace
  • 相关文献

参考文献14

  • 1谭小彬,王卫平,奚宏生,殷保群.计算机系统入侵检测的隐马尔可夫模型[J].计算机研究与发展,2003,40(2):245-250. 被引量:46
  • 2Denning D E. An intrusion detection model[ J ]. IEEE Transactions on Software Engineering. 1987 SE-13(2) :222-232.
  • 3Lunt T F, Tamaru A, Gilham F et al. A Real-Time Intrusion Detection Expert System (IDES) [ R ]. Menlo Park : SRI Computer Science Laboratory, 1992.
  • 4Doak J. Intrusion Detection: The Application of Feature Selection, A Comparison of Algorithms, and the Application of a Wide Area Network Analyzer [ D ]. MS thesis. Department of Computer Science, University of California, Davis, 1992.
  • 5Dedar H, Becker M, Simony D. A Neural Network Component fot an Intrusion Detection System [ A ]. In Proceedings of IEEE Symposium on Research in Computer Security and Privacy [ C] , Oakland, CA, May 1992.
  • 6Sarle W S. Neural networks and statistical models[A]. In Proceedings of 19th Annual SAS Users Group Int. Conf. [C]. Cary, NC,April 1994 : 1538-1550.
  • 7Lee W, Stolfo S J. Data Mining Approaches for Intrusion Detection [ A ]. In Proceedings of the 7th USENIX Security Symposium [ C ].San Antonio, TX, January 1998: 26-29.
  • 8Lee W, Stolfo S J, Chan P K. Learning patterns from UNIX processes execution traces for intrusion detection [ A]. In Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management [ C ].Menlo Park: AKAI Press, 1997: 50-56.
  • 9Vapnik V N. The Nature of Statistical Learning Theory [ M ]. New York : Springer-Verlag, 2000.
  • 10Burges J C. A Tutorial on Support Vector Machines for Pattern Recognition [ R]. Bell Laboratories, Lucent Technologies, 1997.

二级参考文献9

  • 1D E Denning. An intrusion detection model. IEEE Trans on Software Engineering, 1987, 13(2): 222~232
  • 2N Ye. A Markov chain model of temporal behavior for anomal detection. The 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000
  • 3S Jha, K Tan, R Maxion. Markov chains, classifiers, and intrusion detection A. Computer Security Foundations Workshop, the 14th IEEE, Cape Breton, Novia Scotia, Canada, 2001
  • 4E Eskin, L Wenke, S J Stolfo. Modeling system calls for intrusion detection with dynamic window sizes. DARPA Information Survivability Conf & Exposition Ⅱ, Anaheim, California, 2001
  • 5C Warrender, S Forrest, B Pearlmutter. Detecting intrusion using system calls: Alternative data models. In: Proc of the 1999 IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society, 1999. 133~145
  • 6Y Qiao, X W Xin, Y Bin et al. Anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38(13): 663~664
  • 7L R Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989, 77(2): 257~286
  • 8T F Lunt, A Tamaru, F Gilham, et al. IDES: A progress report. In: Proc of Annual Computer Security Applications Conf. Tuscon, Arizona: IEEE Computer Society Press, 1990. 273~285
  • 9S Forrest, S A Hofmeyr, A Somayaji et al. A sense of self for Unix processes. In: Proc of the 1996 IEEE Symp on Security and Privacy. Orkland California: IEEE Computer Society Press, 1996. 120~128

共引文献45

同被引文献50

引证文献5

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部