首页 | 本学科首页   官方微博 | 高级检索  
     

网络入侵检测系统的最优特征选择方法
引用本文:王树,杜启军,余桂贤,余生晨,李广平,徐亚飞,薛阳,王晓伟.网络入侵检测系统的最优特征选择方法[J].计算机工程,2010,36(15):140-141,144.
作者姓名:王树  杜启军  余桂贤  余生晨  李广平  徐亚飞  薛阳  王晓伟
作者单位:1. 华北科技学院计算机系,北京,101601
2. 标旗集团,北京,101028
3. 皖北煤电集团钱营孜煤矿,淮北,234000
4. 北京政法职业学院,北京,102600
基金项目:华北科技学院博士基金资助项目"网络入侵检测系统的几个关键问题的解决方法" 
摘    要:用于网络入侵检测系统(IDS)的特征(变量)数量太多或太少都会降低IDS识别入侵者的正确率。为解决这一矛盾,提出一种选择最优特征的方法。计算每个特征或组合成的新特征对IDS的“贡献”值,选择少量“贡献”值较大的特征(最优特征)作为IDS识别入侵者的特征,既减少特征数量又基本保留了原始特征组所提供的信息。实验证明该方法实用且识别入侵者的正确率较高。

关 键 词:入侵检测系统  最优特征  反向传播神经元网络

Method of Choosing Optimal Characters for Network Intrusion Detection System
WANG Shu,DU Qi-jun,YU Gui-xian,YU Sheng-chen,LI Guang-ping,XU Ya-fei,XUE Yang,WANG Xiao-wei.Method of Choosing Optimal Characters for Network Intrusion Detection System[J].Computer Engineering,2010,36(15):140-141,144.
Authors:WANG Shu  DU Qi-jun  YU Gui-xian  YU Sheng-chen  LI Guang-ping  XU Ya-fei  XUE Yang  WANG Xiao-wei
Affiliation:(1. Department of Computer, North China Institute of Science and Technology, Beijing 101601; 2. Biao-Qi Co. Ltd., Beijing 101028; 3. Qianyingzi Coal Mine, Wanbei Coal and Electricity Co. Ltd., Huaibei 234000; 4. Beijing Management College of Politics and Law, Beijing 102600)
Abstract:Using too many or too too few characters(variable) in Intrusion Detection System(IDS) leads to reduce recognizing correctness of IDS.To resolve the contradiction and to improve the whole performance of IDS,an approach of choosing optimal characters used to IDS is presented.With the approach,new characters made of original characters,"contributions" of new characters for recognizing intruders are computed,and the characters with larger "contributions" value are chosen as the characters of IDS.Number of the characters used to IDS is reduced,and the information belonging to original characters are kept largely to improve recognizing correctness.The characters with larger "contributions" are optimal characters.Tests show that the approach is useful.
Keywords:Intrusion Detection System(IDS)  optimal character  Back Propagate(BP) neural network
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号