期刊文献+

信息熵在数据集分割中的应用研究 被引量:3

The Application of Entropy in the Segmentation of Data Set
下载PDF
导出
摘要 针对现行数据集分割方法中的不足,从信息学的角度出发,引用信息熵理论,提出了一种简单可行的数据集分割方法,即选择使数据子集的总体熵较小的分割方式,实验结果证明了这种方法的有效性。 As for the disadvantage of the current way to separate the large data set to a group of ones,from the perspective of informatics,advanced a new way to separate the large data set to a group of ones based on entropy,namely select intersected quomodo to less macro- Entropy of Data Set ,The results of the experiment prove this method is validity.
作者 苗卿 单立新 裘昱 MIAO Qing,SHAN Li-Xin,QIU Yu (Artillery Academy,Hefei 230031,China)
机构地区 炮兵学院
出处 《电脑知识与技术》 2007年第3期1193-1194,共2页 Computer Knowledge and Technology
关键词 信息熵 数据集分割 入侵检测 Entropy Segmentation of Data Set Intrusion Detection
  • 相关文献

参考文献1

二级参考文献20

  • 1Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 2Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 3Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 4Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
  • 5Anderson J P.Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co, 1980.
  • 6Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.
  • 7Kahn C, Porras P, Staniford-Chen, et al. A common intrusion detection framework[EB/OL]. 1998. http:/www.isi.edu/gost/cidf/papers/cidf-jcs.ps.
  • 8Teng H S, Chen K, Lu S C. Security audit trail analysis using inductively generated predictive rules[A]. Proceeding of the Sixth Conference on Artificial Intelligence Applications[C]. Los Alamitos, USA: IEEE Computer Society Press, 1990. 24-29.
  • 9Crosbie M, Spafford E. Applying genetic programming to intrusion detection[R]. West Lafayette, USA: Purdue University, Department of Computer Sciences, 1995.
  • 10Lane T, Brodley C E. Temporal sequence learning and data reduction for anomaly detection[J].ACM Transactions on Information and System Security, 1999, 2(3): 295-331.

共引文献44

同被引文献38

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部