首页 | 本学科首页   官方微博 | 高级检索  
     

基于模糊数据挖掘与遗传算法的异常检测方法
引用本文:孙东,黄天戍,秦丙栓,朱天清.基于模糊数据挖掘与遗传算法的异常检测方法[J].计算机应用,2006,26(1):210-0212.
作者姓名:孙东  黄天戍  秦丙栓  朱天清
作者单位:1. 武汉大学,电子信息学院,湖北,武汉,430079
2. 中国有线电视网络公司大客户部,北京,100053
3. 武汉工业学院计算机与信息工程系,湖北,武汉,430023
摘    要:建立合适的隶属度函数是入侵检测中应用模糊数据挖掘所面临的一个难点。针对这一问题,提出了在异常检测中运用遗传算法对隶属度函数的参数进行优化的方法。将隶属度函数的参数组合成有序的参数集并编码为遗传个体,在个体的遗传进化中嵌入模糊数据挖掘,可以搜索到最佳的参数集。采用这一参数集,能够在实时检测中最大限度地将系统正常状态与异常状态区分开来,提高异常检测的准确性。最后,对网络流量的异常检测实验验证了这一方法的可行性。

关 键 词:异常检测  模糊数据挖掘  遗传算法
文章编号:1001-9081(2006)01-0210-03
收稿时间:2005-07-22
修稿时间:2005-07-222005-10-10

Anomaly detection approach based on fuzzy data mining and genetic algorithm
SUN Dong,HUANG Tian-shu,QIN Bing-shuan,ZHU Tian-qing.Anomaly detection approach based on fuzzy data mining and genetic algorithm[J].journal of Computer Applications,2006,26(1):210-0212.
Authors:SUN Dong  HUANG Tian-shu  QIN Bing-shuan  ZHU Tian-qing
Abstract:Defining appropriate membership functions is a difficult task in fuzzy data mining to detect intrusions. To solve the problem, an approach that applies genetic algorithm to optimize parameters of membership functions in anomaly detection was presented. Parameters of membership functions were arranged into a sequential parameter-set coded to an individual. An optimal parameter-set could be derived by embedding fuzzy data mining in the process of evolution of individual. With the parameter-set in anomaly detection, normal state of protected system could be differentiated from anomalous state in the most extent, and the veracity of anomaly detection was improved greatly. Experiments on anomaly detection to network tratffic prove the feasibility of the approach.
Keywords:anomaly detection  fuzzy data mining  genetic algorithm
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号