计算机科学 ›› 2015, Vol. 42 ›› Issue (2): 147-149.doi: 10.11896/j.issn.1002-137X.2015.02.032

• 信息安全 • 上一篇    下一篇

基于云模型和半监督聚类的入侵检测算法

李永忠,张杰   

  1. 江苏科技大学计算机科学与工程学院 镇江212003,江苏科技大学计算机科学与工程学院 镇江212003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受江苏省高校自然科学基金资助

Intrusion Detection Algorithm Based on Cluster and Cloud Model

LI Yong-zhong and ZHANG Jie   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对目前网络入侵检测率低、误报率高的问题,提出了一种将云模型和半监督聚类相结合的入侵检测算法。先对聚类算法作改进,使其能够获得稳定的聚类结果。由于属性对分类贡献程度的不同,引入了云相对贴近度的概念,给出了计算属性权重的方法。以改进的聚类方法为基础建立了云模型,对属性使用动态加权和更新云模型的方法逐渐强化分类器以指导数据的分类。KDD CUP99实验数据的仿真结果证明了该算法的有效性。

关键词: 云模型,聚类,入侵检测,IDS

Abstract: A new intrusion detection algorithm based on cluster and cloud model was proposed to solve the low rate of high false alarm rate problem in network intrusion detection.Because of the different contribution of the attributes to the classification,the attributes were given based on the concept of “clouds approach degree”.The cloud model was builded based on the improved cluster in the text.Using the method of dynamic weighting and the cloud model updating for the attributes gradually strengthens the classifier to guide the data classification.KDD CUP99 data set was implemented to evaluate the proposed algorithm.Experimental results prove that the method is feasible and effective.

Key words: Cloud model,Cluster,Intrusion detection,IDS

[1] 李德毅,邸凯昌,李德仁,等.用语言云模型发掘关联规则[J].软件学报,2000,1(2):143-158
[2] 李德毅,史雪梅,孟海军.隶属云和隶属云发生器[J].计算机研究和发展,1995,6(32):15-20
[3] 李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34
[4] 吕辉军,王晔,李德毅,等.逆向云在定性评价中的应用[J].计算机学报,2003,6(8):1009-1014
[5] 付斌,李道国,王慕快.云模型研究的回顾与展望[J].计算机应用研究,2011,8(2):420-425
[6] 刘常昱,冯芒,李德毅,等.基于云X信息的逆向云新算法[J].系统仿真学报,2004,6(11):2417-2410
[7] Basu S,Baneriee A,Mooney R.Semi-supervised clustering byseeding[C]∥Proceedings of the 19th International Conference on Machine Learning.San Francisco,CA:Morgan Kaufmann Publishers,2002:19-26
[8] Flanagan J A.Unsupervised clustering of symbol strings[C]∥International Joint Conference on Neural Networks(IJCNN’03).Portland Oregon,USA:2003,0-3255
[9] Li Yong-zhong,Li Zheng-jie.Anomaly Intrusion DetectionMethod Based on K-means Clustering Algorithm with Particle Swarm Optimization [C]∥International Conference of Information Technology,Computer Engineering and Management Sciences(ICM 2011).2006:415-426
[10] 姜伟,高知新,李本喜.基于多维云模型的入侵检测[J].计算机工程,2006,2(24):155-156
[11] 李涵.基于聚类的异常检测方法的研究与实现[J].北京信息科技大学学报,2010,5(3):80-83
[12] KDD CUP 1999 Data set.http://kdd.ics.uci.edu/databases/ kddcup99

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!