计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 335-338.doi: 10.11896/j.issn.1002-137X.2016.6A.080
屈洪春,王帅
QU Hong-chun and WANG Shuai
摘要: 为了提高入侵检测系统的检测率并降低误报率,将误用检测技术和异常检测技术进行结合,以克服采用单一技术的缺陷。采用改进的进化神经网络作为检测引擎,首先,通过对遗传算法进行改进,弥补实数编码全局寻优能力差的缺陷,且降低计算的复杂度,提高进化收敛速度;然后,将改进的遗传算法和BP神经网络的LM算法进行结合,进一步克服神经网络学习阶段训练速度慢和易陷入局部最优的缺点,进而提高神经网络的分类能力和模式识别能力。采用 KDDCUP99数据集作为训练与测试数据集进行实验,结果表明,基于改进的进化神经网络建立的混合入侵检测模型在数据特征规则的提取速度、检测精度以及识别新的攻击类型方面有明显改善。
[1] 阎巧,谢维信.异常检测技术的研究与发展[J].西安电子科技大学学报,2002,29(1):128-132 [2] Raju E,Sravanthi K.Network intrusion detection using Support Vector Machines[J].International Journal of Computer Science And Management Research,2013,2(1):1313-1319 [3] Creech G,Hu J.A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns [J].IEEE Transactions on Computers,2014,63(4):807-819 [4] Shen J,Wang J,Ai H.An Improved Artificial Immune Systembased Network Intrusion Detection by Using Rough Set[J].Communications & Network,2012,4(1):41-47 [5] Lee S C,Heinbuch D V.Training a neural network based intrusion detector to recognize novel attacks[J].IEEE Transactions on Systems Man & Cybernetics Part A Systems & Humans,2001,31(4):294-299 [6] 林冬茂,薛德黔.一种基于无监督免疫优化分层的网络入侵检测算法[J].计算机科学,2013,0(3):180-182 [7] Kim G,Lee S,Kim S.A novel hybrid intrusion detection method integrating anomaly detection with misuse detection[J].Expert Systems with Applications,2014,41(4):1690-1700 [8] Shirazi H M.Anomaly Intrusion Detection System Using Information Theory,K-NN and KMC Algorithms[J].Australian Journal of Basic & AppliedSciences,2009,3(3):2581-2597 [9] Lin S,Ying K,Lee C,et al.An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection [J].Applied Soft Computing,2012,12(10):3285-3290 [10] Ahmad I,Hussain M,Alghamdi A,et al.Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components[J].Neural Computing &Applications,2014,24(78):1671-1682 [11] Gan X S,Duanmu J S,Wang J F,et al.Anomaly intrusion detection based on PLS feature extraction and core vector machine[J].Knowledge-Based Systems,2013,40(1):1-6 [12] 王丽娜,董晓梅,等.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110 [13] 梁昔明,龙文,秦浩宇,等.基于种群个体可行性的约束优化进化算法[J].控制与决策,2010,5(8):1129-1132 [14] Han F,Liu H.High Dimensional Semiparametric Scale Invariant Principal Component Analysis[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2014,36(10):2016-2032 |
No related articles found! |
|