期刊文献+

动态自学习的入侵检测模型研究

Research on dynamic self-learning intrusion detection model
下载PDF
导出
摘要 针对目前常见的入侵检测的模型的一些结构性的缺点,提出了基本数据挖掘的动态自学习入侵检测模型DMIDS,给出了动态自学习的正常行为库的更新机制,克服了传统静态检测模型必须完全重新学习才能更新模型甚至无法重新学习的缺陷。通过基于KDD’99数据集的实验,表明其相对于传统的异常检测方法在保证较高检测率的前提下,有效地降低了误报率。 It has a few configuration disadvantages in the current popular intrusion detection system. The dynamic self-learning intrusion detection model DMIDS based on envisaging this configuration disadvantage is brought forward. And the renewal mechanism of the dynamic self-learning normal behavior database is presented. This model overcomes the disadvantage that the traditional static detecting model must relearn over all the old and new examples, even can not relearn because of limited memory size. The proof from the test based on KDD' 99 attests this model DMIDS reduce the error ratio effectively comparing with the traditional anomaly detection under the precondition of pledging the rate of detection.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第11期2660-2662,共3页 Computer Engineering and Design
关键词 网络安全 异常检测 数据挖掘 入侵检测 动态自学习 internet safety anomaly detection data mining intrusion detection dynamic self-learning
  • 相关文献

参考文献9

  • 1Snort 2.0 protocol flow analyzer, sourcefire Inc [EB/OL].http:// www.sourcefire.com,2003.
  • 2Denning DE. An intrusion-detection model [J]. IEEE Trans on Software Engineering, 1987,13(2):222-232.
  • 3杨种学.一种基于动态聚类的异常入侵检测方法[J].计算机工程与设计,2006,27(17):3291-3294. 被引量:1
  • 4Jiawei Hank,Micheline Kamber数据挖掘概念与技术[M].2版.北京:机械工业出版社,2007:226-228.
  • 5罗敏,阴晓光,张焕国,王丽娜,李小红.基于核函数的入侵检测方法研究[J].计算机应用研究,2007,24(12):162-164. 被引量:2
  • 6饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:134
  • 7齐建东.基于数据挖掘的网络入侵检测研究[D].北京:中国农业大学博士研究生学位论文,2005.
  • 8KDD Cup 1999 Dataset[EB/OL].http://kdd.ics.uci.edu/databases/kddeup99/kddeup99.html, 1999.
  • 9Portnoy L,Eskin E,Stoifo SJ.Intrusion detection with unlabeled data using clustering[C].Philadelphia: Proceedings of ACMCSS Workshop on Data Mining Applied to Security,2001.

二级参考文献27

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 7James P Anderson.Computer security threat monitoring and surveillance[R].Fort Washington,PA:Technical report,1980.
  • 8Frank J.Artificial intelligence and intrusion detection:Current and future directions[EB/OL].http://www.seclab.cs.ucdavis.edu/papers/ncsc.94.ps.
  • 9Helman P,Bhangoo J.A statistically base system for prioritizing information exploration under uncertainty[J] JEEE Transactions on Systems,Man and Cybernetics,PartA:Systems and Humans,1997,27:449-466.
  • 10Denault M,Gritzalis D,Karagiannis D,et al.Intrusion detection:Approach and performance issues of the SECURENET System[J].Computers and Security,1994,13 (6):495-507.

共引文献134

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部