期刊文献+
共找到264篇文章
< 1 2 14 >
每页显示 20 50 100
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
1
作者 Gulshan Kumar Krishan Kumar 《International Journal of Intelligence Science》 2012年第4期115-127,共13页
Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In... Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In literature, many researchers utilized Artificial Neural Networks (ANN) in supervised learning based intrusion detection successfully. Here, ANN maps the network traffic into predefined classes i.e. normal or specific attack type based upon training from label dataset. However, for ANN-based IDS, detection rate (DR) and false positive rate (FPR) are still needed to be improved. In this study, we propose an ensemble approach, called MANNE, for ANN-based IDS that evolves ANNs by Multi Objective Genetic algorithm to solve the problem. It helps IDS to achieve high DR, less FPR and in turn high intrusion detection capability. The procedure of MANNE is as follows: firstly, a Pareto front consisting of a set of non-dominated ANN solutions is created using MOGA, which formulates the base classifiers. Subsequently, based upon this pool of non-dominated ANN solutions as base classifiers, another Pareto front consisting of a set of non-dominated ensembles is created which exhibits classification tradeoffs. Finally, prediction aggregation is done to get final ensemble prediction from predictions of base classifiers. Experimental results on the KDD CUP 1999 dataset show that our proposed ensemble approach, MANNE, outperforms ANN trained by Back Propagation and its ensembles using bagging & boosting methods in terms of defined performance metrics. We also compared our approach with other well-known methods such as decision tree and its ensembles using bagging & boosting methods. 展开更多
关键词 ENSEMBLE CLASSIFIERS intrusion detection System intrusion detection Multi-Objective genetic algorithm
在线阅读 下载PDF
Using Genetic Algorithm to Support Artificial Neural Network for Intrusion Detection System
2
作者 Amin Dastanpour Suhaimi Ibrahim Reza Mashinchi Ali Selamat 《通讯和计算机(中英文版)》 2014年第2期143-147,共5页
关键词 入侵检测系统 人工神经网络 遗传算法 神经网络优化 ANN 数据集 攻击 线程
在线阅读 下载PDF
A Genetic Algorithm-Based Double Auction Framework for Secure and Scalable Resource Allocation in Cloud-Integrated Intrusion Detection Systems
3
作者 Siraj Un Muneer Ihsan Ullah +1 位作者 Zeshan Iqbal Rajermani Thinakaran 《Computers, Materials & Continua》 2025年第12期4959-4975,共17页
The complexity of cloud environments challenges secure resource management,especially for intrusion detection systems(IDS).Existing strategies struggle to balance efficiency,cost fairness,and threat resilience.This pa... The complexity of cloud environments challenges secure resource management,especially for intrusion detection systems(IDS).Existing strategies struggle to balance efficiency,cost fairness,and threat resilience.This paper proposes an innovative approach to managing cloud resources through the integration of a genetic algorithm(GA)with a“double auction”method.This approach seeks to enhance security and efficiency by aligning buyers and sellers within an intelligent market framework.It guarantees equitable pricing while utilizing resources efficiently and optimizing advantages for all stakeholders.The GA functions as an intelligent search mechanism that identifies optimal combinations of bids from users and suppliers,addressing issues arising from the intricacies of cloud systems.Analyses proved that our method surpasses previous strategies,particularly in terms of price accuracy,speed,and the capacity to manage large-scale activities,critical factors for real-time cybersecurity systems,such as IDS.Our research integrates artificial intelligence-inspired evolutionary algorithms with market-driven methods to develop intelligent resource management systems that are secure,scalable,and adaptable to evolving risks,such as process innovation. 展开更多
关键词 Cloud computing combinatorial double auction genetic algorithm optimization resource allocation intrusion detection system(IDS) cloud security
在线阅读 下载PDF
Genetic Algorithm with Variable Length Chromosomes for Network Intrusion Detection 被引量:5
4
作者 Sunil Nilkanth Pawar Rajankumar Sadashivrao Bichkar 《International Journal of Automation and computing》 EI CSCD 2015年第3期337-342,共6页
Genetic algorithm(GA) has received significant attention for the design and implementation of intrusion detection systems. In this paper, it is proposed to use variable length chromosomes(VLCs) in a GA-based network i... Genetic algorithm(GA) has received significant attention for the design and implementation of intrusion detection systems. In this paper, it is proposed to use variable length chromosomes(VLCs) in a GA-based network intrusion detection system.Fewer chromosomes with relevant features are used for rule generation. An effective fitness function is used to define the fitness of each rule. Each chromosome will have one or more rules in it. As each chromosome is a complete solution to the problem, fewer chromosomes are sufficient for effective intrusion detection. This reduces the computational time. The proposed approach is tested using Defense Advanced Research Project Agency(DARPA) 1998 data. The experimental results show that the proposed approach is efficient in network intrusion detection. 展开更多
关键词 genetic algorithms intrusion detection variable length chromosome network security evolutionary optimization.
原文传递
Anomaly Classification Using Genetic Algorithm-Based Random Forest Modelfor Network Attack Detection 被引量:7
5
作者 Adel Assiri 《Computers, Materials & Continua》 SCIE EI 2021年第1期767-778,共12页
Anomaly classification based on network traffic features is an important task to monitor and detect network intrusion attacks.Network-based intrusion detection systems(NIDSs)using machine learning(ML)methods are effec... Anomaly classification based on network traffic features is an important task to monitor and detect network intrusion attacks.Network-based intrusion detection systems(NIDSs)using machine learning(ML)methods are effective tools for protecting network infrastructures and services from unpredictable and unseen attacks.Among several ML methods,random forest(RF)is a robust method that can be used in ML-based network intrusion detection solutions.However,the minimum number of instances for each split and the number of trees in the forest are two key parameters of RF that can affect classification accuracy.Therefore,optimal parameter selection is a real problem in RF-based anomaly classification of intrusion detection systems.In this paper,we propose to use the genetic algorithm(GA)for selecting the appropriate values of these two parameters,optimizing the RF classifier and improving the classification accuracy of normal and abnormal network traffics.To validate the proposed GA-based RF model,a number of experiments is conducted on two public datasets and evaluated using a set of performance evaluation measures.In these experiments,the accuracy result is compared with the accuracies of baseline ML classifiers in the recent works.Experimental results reveal that the proposed model can avert the uncertainty in selection the values of RF’s parameters,improving the accuracy of anomaly classification in NIDSs without incurring excessive time. 展开更多
关键词 Network-based intrusion detection system(NIDS) random forest classifier genetic algorithm KDD99 UNSW-NB15
在线阅读 下载PDF
INTERNET INTRUSION DETECTION MODEL BASED ON FUZZY DATA MINING
6
作者 陈慧萍 王建东 +1 位作者 叶飞跃 王煜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2005年第3期247-251,共5页
An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a... An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features. 展开更多
关键词 intrusion detection data mining fuzzy logic genetic algorithm anomaly detection
在线阅读 下载PDF
Bio-inspired Hybrid Feature Selection Model for Intrusion Detection
7
作者 Adel Hamdan Mohammad Tariq Alwada’n +2 位作者 Omar Almomani Sami Smadi Nidhal ElOmari 《Computers, Materials & Continua》 SCIE EI 2022年第10期133-150,共18页
Intrusion detection is a serious and complex problem.Undoubtedly due to a large number of attacks around the world,the concept of intrusion detection has become very important.This research proposes a multilayer bioin... Intrusion detection is a serious and complex problem.Undoubtedly due to a large number of attacks around the world,the concept of intrusion detection has become very important.This research proposes a multilayer bioinspired feature selection model for intrusion detection using an optimized genetic algorithm.Furthermore,the proposed multilayer model consists of two layers(layers 1 and 2).At layer 1,three algorithms are used for the feature selection.The algorithms used are Particle Swarm Optimization(PSO),Grey Wolf Optimization(GWO),and Firefly Optimization Algorithm(FFA).At the end of layer 1,a priority value will be assigned for each feature set.At layer 2 of the proposed model,the Optimized Genetic Algorithm(GA)is used to select one feature set based on the priority value.Modifications are done on standard GA to perform optimization and to fit the proposed model.The Optimized GA is used in the training phase to assign a priority value for each feature set.Also,the priority values are categorized into three categories:high,medium,and low.Besides,the Optimized GA is used in the testing phase to select a feature set based on its priority.The feature set with a high priority will be given a high priority to be selected.At the end of phase 2,an update for feature set priority may occur based on the selected features priority and the calculated F-Measures.The proposed model can learn and modify feature sets priority,which will be reflected in selecting features.For evaluation purposes,two well-known datasets are used in these experiments.The first dataset is UNSW-NB15,the other dataset is the NSL-KDD.Several evaluation criteria are used,such as precision,recall,and F-Measure.The experiments in this research suggest that the proposed model has a powerful and promising mechanism for the intrusion detection system. 展开更多
关键词 intrusion detection Machine learning Optimized genetic algorithm(GA) Particle Swarm Optimization algorithms(PSO) Grey Wolf Optimization algorithms(GWO) FireFly Optimization algorithms(FFA) genetic algorithm(GA)
在线阅读 下载PDF
Intrusion detection using rough set classification 被引量:16
8
作者 张连华 张冠华 +2 位作者 郁郎 张洁 白英彩 《Journal of Zhejiang University Science》 EI CSCD 2004年第9期1076-1086,共11页
Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learn... Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of'IF-THEN' rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set). 展开更多
关键词 intrusion detection Rough set classification Support vector machine genetic algorithm
在线阅读 下载PDF
Immune Recognition Method Based on Analogy Reasoning in Intrusion Detection System 被引量:1
9
作者 ZHANG Changyou CAO Yuanda +2 位作者 YANG Minghua YU Jiong ZHU Dongfeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1839-1843,共5页
In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is appli... In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is applied in an IDS (Intrusion Detection System) following several steps. Firstly, the initial abnormal behaviours sample set is optimized through the combining of the AIS (Artificial Immune System) and the genetic algorithm. Then, the abnormity probability algorithm is raised considering the two sides of abnormality and normality. Finally, an intrusion detection system model is established based on the above algorithms and models. 展开更多
关键词 immune recognition analogy reasoning SIMILARITY genetic algorithm intrusion detection system
在线阅读 下载PDF
Hybrid Optimization of Support Vector Machine for Intrusion Detection
10
作者 席福利 郁松年 +1 位作者 HAO Wei 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期51-56,共6页
Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques.... Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it’s an effective method and can improve the performance of SVM-based intrusion detection system further. 展开更多
关键词 intrusion detection system IDS) support vector machine SVM) genetic algorithm GA system call trace ξα-estimator sequential minimal optimization(SMO)
在线阅读 下载PDF
Novel Model for Intrusion Detection 被引量:1
11
作者 Li Jia\|chun, Li Z hi\|tang School of Computer Science and Techno logy, Huazhong University of Science and Te chnology, Wuhan 430074, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第01A期46-50,共5页
It's very difficult tha t the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in f... It's very difficult tha t the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variations of attack signature. In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed. 展开更多
关键词 intrusion detection FUZZY fuzzy expert system genetic algorithm
在线阅读 下载PDF
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
12
作者 Wafa Alsharafat 《Communications and Network》 2019年第1期11-20,共10页
Due to the ever growing number of cyber attacks, especially of the online systems, development and operation of adaptive Intrusion Detection Systems (IDSs) is badly needed so as to protect these systems. It remains as... Due to the ever growing number of cyber attacks, especially of the online systems, development and operation of adaptive Intrusion Detection Systems (IDSs) is badly needed so as to protect these systems. It remains as a goal of paramount importance to achieve and a serious challenge to address. Different selection methods have been developed and implemented in Genetic Algorithms (GAs) to enhance the rate of detection of the IDSs. In this respect, the present study employed the eXtended Classifier System (XCS) for detection of intrusions by matching the incoming environmental message (packet) with a classifiers pool to determine whether the incoming message is a normal request or an intrusion. Fuzzy Clustering by Local Approximation Membership (FLAME) represents the new selection method used in GAs. In this study, Genetic Algorithm with FLAME selection (FGA) was used as a production engine for the XCS. For comparison purposes, different selection methods were compared with FLAME selection and all experiments and evaluations were performed by using the KDD’99 dataset. 展开更多
关键词 FLAME intrusion detection XCS genetic algorithm
暂未订购
A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction System 被引量:7
13
作者 Siva S. Sivatha Sindhu S. Geetha +1 位作者 M. Marikannan A. Kannan 《International Journal of Automation and computing》 EI 2009年第4期406-414,共9页
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attac... Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this work show that the system achieves improvement in terms of misclassification cost when compared with conventional IDS. The results of the experiments show that this system can be deployed based on a real network or database environment for effective prediction of both normal attacks and new attacks. 展开更多
关键词 genetic algorithm intrusion detection system (IDS) neural networks weightage calculation knowledge discovery in databases (KDD) classification.
在线阅读 下载PDF
Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection
14
作者 M.Reji Christeena Joseph +1 位作者 K.Thaiyalnayaki R.Lathamanju 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1265-1278,共14页
The wireless ad-hoc networks are decentralized networks with a dynamic topology that allows for end-to-end communications via multi-hop routing operations with several nodes collaborating themselves,when the destinati... The wireless ad-hoc networks are decentralized networks with a dynamic topology that allows for end-to-end communications via multi-hop routing operations with several nodes collaborating themselves,when the destination and source nodes are not in range of coverage.Because of its wireless type,it has lot of security concerns than an infrastructure networks.Wormhole attacks are one of the most serious security vulnerabilities in the network layers.It is simple to launch,even if there is no prior network experience.Signatures are the sole thing that preventive measures rely on.Intrusion detection systems(IDS)and other reactive measures detect all types of threats.The majority of IDS employ features from various network layers.One issue is calculating a huge layered features set from an ad-hoc network.This research implements genetic algorithm(GA)-based feature reduction intrusion detection approaches to minimize the quantity of wireless feature sets required to identify worm hole attacks.For attack detection,the reduced feature set was put to a fuzzy logic system(FLS).The performance of proposed model was compared with principal component analysis(PCA)and statistical parametric mapping(SPM).Network performance analysis like delay,packet dropping ratio,normalized overhead,packet delivery ratio,average energy consumption,throughput,and control overhead are evaluated and the IDS performance parameters like detection ratio,accuracy,and false alarm rate are evaluated for validation of the proposed model.The proposed model achieves 95.5%in detection ratio with 96.8%accuracy and produces very less false alarm rate(FAR)of 14%when compared with existing techniques. 展开更多
关键词 intrusion detection system wormhole attack genetic algorithm fuzzy logic wireless ad-hoc network
在线阅读 下载PDF
基于小生境遗传算法的网络入侵节点智能检测方法 被引量:1
15
作者 王建刚 《吉林大学学报(理学版)》 北大核心 2025年第4期1099-1104,共6页
为降低网络入侵的风险,提出一种基于小生境遗传算法的网络入侵节点智能检测方法.首先,针对网络入侵的攻击行为进行聚合处理,利用双人攻防博弈模型分析网络的攻防状态,通过比对攻击与防御的效用强度,对网络的安全性进行全面分析,再根据... 为降低网络入侵的风险,提出一种基于小生境遗传算法的网络入侵节点智能检测方法.首先,针对网络入侵的攻击行为进行聚合处理,利用双人攻防博弈模型分析网络的攻防状态,通过比对攻击与防御的效用强度,对网络的安全性进行全面分析,再根据分析结果,通过卷积神经网络实现对攻击源的定位.其次,基于粗糙集理论,利用小生境遗传算法确定网络入侵节点检测的适应度函数,根据网络入侵节点智能检测规则,建立网络入侵节点智能检测模型,获得最终的检测结果.实验结果表明,该方法可有效提升对入侵攻击源的定位准确性和入侵节点检测准确性,该方法检测结果的宏F1分数大于0.96,表明该方法可有效实现设计预期. 展开更多
关键词 小生境遗传算法 网络入侵 入侵节点 粗糙集理论 适应度函数 入侵检测
在线阅读 下载PDF
一种用于MANETs的分布式自监督入侵检测方法
16
作者 陈迎春 李晋国 《计算机应用与软件》 北大核心 2025年第10期342-349,387,共9页
随着MANETs的广泛应用,入侵现象愈发严重,而大多检测方案无法满足其准确性和实时性的需求。因此融合深度顺序结构TabNet和遗传算法改进的门控循环单元(Tab-GAGRU)设计分布式自监督入侵检测方法。通过TabNet进行预训练,为分类模型提供了... 随着MANETs的广泛应用,入侵现象愈发严重,而大多检测方案无法满足其准确性和实时性的需求。因此融合深度顺序结构TabNet和遗传算法改进的门控循环单元(Tab-GAGRU)设计分布式自监督入侵检测方法。通过TabNet进行预训练,为分类模型提供了细粒度的表征信息;构建GRU捕捉特征向量的时间依赖性,通过遗传算法对其网络参数进行自动寻优,保证异常检测精度;使用Spark优化资源减少模型训练时间。实验结果表明,该方法准确率最高可达99.95%,检测时间最快可达22.4 s。 展开更多
关键词 MANETS 入侵检测 深度顺序网络 遗传算法 GRU SPARK
在线阅读 下载PDF
空分复用弹性光网络中异常入侵行为自动检测
17
作者 任雁 王文溥 李咸静 《激光杂志》 北大核心 2025年第9期173-177,共5页
由于网络结构的复杂性和传输数据的高维特征,空分复用弹性光网络容易受到各种形式的网络攻击,导致网络性能下降。为了有效提升空分复用弹性光网络的安全性,提出一种空分复用弹性光网络中异常入侵行为自动检测方法。利用信息增益比对空... 由于网络结构的复杂性和传输数据的高维特征,空分复用弹性光网络容易受到各种形式的网络攻击,导致网络性能下降。为了有效提升空分复用弹性光网络的安全性,提出一种空分复用弹性光网络中异常入侵行为自动检测方法。利用信息增益比对空分复用弹性光网络的原始数据特征集展开有序排列,运用遗传算法对排列后的特征展开特征选择,组建可疑行为特征集。在可疑行为特征集中,使用自适应密度峰值聚类和反向K近邻,设定簇半径并迭代优化,最终实现空分复用弹性光网络中异常入侵行为自动检测。实验结果表明,所提方法的异常入侵行为自动检出率在99.5%以上,且ROC曲线的面积相对较大。说明所提方法可以显著提升异常入侵行为检测结果的准确性,有效确保网络的稳定运行和数据的安全。 展开更多
关键词 空分复用弹性光网络 异常入侵行为 自动检测 遗传算法 自适应密度峰值聚类
原文传递
一种高效的面向轻量级入侵检测系统的特征选择算法 被引量:46
18
作者 陈友 沈华伟 +1 位作者 李洋 程学旗 《计算机学报》 EI CSCD 北大核心 2007年第8期1398-1408,共11页
特征选择是网络安全、模式识别、数据挖掘等领域的重要问题之一.针对高维数据对象,特征选择一方面可以提高分类精度和效率,另一方面可以找出富含信息的特征子集.文中提出一种wrapper型的特征选择算法来构建轻量级入侵检测系统.该算法采... 特征选择是网络安全、模式识别、数据挖掘等领域的重要问题之一.针对高维数据对象,特征选择一方面可以提高分类精度和效率,另一方面可以找出富含信息的特征子集.文中提出一种wrapper型的特征选择算法来构建轻量级入侵检测系统.该算法采用遗传算法和禁忌搜索相混合的搜索策略对特征子集空间进行随机搜索,然后利用提供的数据在无约束优化线性支持向量机上的平均分类正确率作为特征子集的评价标准来获取最优特征子集.文中按照DOS,PROBE,R2L,U2R4个类别对KDD1999数据集进行分类,并且在每一类上进行了大量的实验.实验结果表明,对每一类攻击文中提出的特征选择算法不仅可以加快特征选择的速度,而且基于该算法构建的入侵检测系统在建模时间、检测时间、检测已知攻击、检测未知攻击上,与没有运用特征选择的入侵检测系统相比具有更好的性能. 展开更多
关键词 特征选择 遗传算法 禁忌搜索 线性支持向量机 入侵检测系统
在线阅读 下载PDF
基于遗传算法的入侵检测特征选择 被引量:28
19
作者 朱红萍 巩青歌 雷战波 《计算机应用研究》 CSCD 北大核心 2012年第4期1417-1419,1426,共4页
针对入侵检测日志数据存在大量不相关特征和冗余特征,导致入侵检测数据集维数较高,检测算法实时性较低的问题,提出一种基于遗传算法的入侵检测特征选择算法。首先删除入侵检测数据集中的不相关特征及冗余特征,构建有效特征集L,并通过偏... 针对入侵检测日志数据存在大量不相关特征和冗余特征,导致入侵检测数据集维数较高,检测算法实时性较低的问题,提出一种基于遗传算法的入侵检测特征选择算法。首先删除入侵检测数据集中的不相关特征及冗余特征,构建有效特征集L,并通过偏F检验对特征进一步选择,构成待优化特征集L';然后采用遗传算法对L'进行优化选择,选出最能反映系统状态的特征集L″。仿真实验结果证明,该算法在保证特征分类精度和确保入侵检测漏检率、误检率尽量小的前提下明显提高了入侵检测的效率。 展开更多
关键词 入侵检测 特征选择 偏F检验 遗传算法
在线阅读 下载PDF
改进粒子群联合禁忌搜索的特征选择算法 被引量:15
20
作者 张震 魏鹏 +3 位作者 李玉峰 兰巨龙 徐萍 陈博 《通信学报》 EI CSCD 北大核心 2018年第12期60-68,共9页
针对入侵检测中数据特征维度高的问题,提出了改进粒子群联合禁忌搜索(IPSO-TS)的特征选择算法。采用遗传算子对粒子群算法进行了改进,得到了特征选择初始最优解;对该解进行禁忌搜索(TS)得到了特征子集的全局优化解。基于KDD CUP 99数据... 针对入侵检测中数据特征维度高的问题,提出了改进粒子群联合禁忌搜索(IPSO-TS)的特征选择算法。采用遗传算子对粒子群算法进行了改进,得到了特征选择初始最优解;对该解进行禁忌搜索(TS)得到了特征子集的全局优化解。基于KDD CUP 99数据集的实验结果表明,相较遗传算子整合粒子群算法(CMPSO)、粒子群算法(PSO)和粒子群联合禁忌算法,IPSO-TS减少了至少29.2%的特征,缩短了至少15%的平均检测时间,提高了至少2.96%的平均分类准确率。 展开更多
关键词 入侵检测 特征选择 粒子群 遗传算法 禁忌搜索
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部