期刊文献+

基于随机子空间法的多Agent分布式入侵检测 被引量:1

Multi-agent Distributed Intrusion Detection Based on Random Subspace Method
下载PDF
导出
摘要 提出了一种基于随机子空间的多Agent分布式入侵检测方法。该方法把支持向量机作为检测Agent的核心检测算法,通过引入随机子空间生成具有知识互补特性的多个Agent,将其分布于网络的各个检测节点,用集成的思想把各Agent的结论进行合成。采用这种多Agent的分布式检测可以有效地提高系统的鲁棒性。实验表明这种方法的检测精度高于单个SVM和Bagging方法。 A multi-agent distributed intrusion detection method based on random subspace method is put forward. Support vector machine method is the key detection algorithm of intrusion detection agent. The knowledge complementarity of multiple agents is created by the introduction of random subspace method, then these agents are distributed to detection nodes in the network. Subsequently the conclusions of each agent are composed by the ensemble idea. The robustness of the system is effectively improved by distributed intrusion detection based on multi agent. The experiment results show that detection precision of this method is higher than that of single SVM and Bagging.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第14期121-122,150,共3页 Computer Engineering
基金 云南省自然科学基金资助项目(2005F0028Q) 云南省教育厅基金资助项目(5Y0588D) 云南民族大学重点课程建设项目
关键词 入侵检测 多AGENT 支持向量机 随机子空间 intrusion detection multi-agent support vector machine random subspace
  • 相关文献

参考文献5

  • 1Spafford E,Zamboni D.Intrusion Detection Using Autonomous Agents[J].Computer Networks,2000,34(4):547-570. 被引量:1
  • 2Vapnik V N 张学工.统计学习理论的本质[M].北京:清华大学出版社,2000.. 被引量:174
  • 3Ho T K.The Random Subspace Method for Constructing Decision Forests[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1998,20(8):832-844. 被引量:1
  • 4谷雨,徐宗本,孙剑,郑锦辉.基于PCA与ICA特征提取的入侵检测集成分类系统[J].计算机研究与发展,2006,43(4):633-638. 被引量:25
  • 5Blake C L,Merz C J.UCI Repository of Machine Learning Databases[DB/OL].1998.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. 被引量:1

二级参考文献11

  • 1谷雨,郑锦辉,孙剑,徐宗本.基于独立成分分析和支持向量机的入侵检测方法[J].西安交通大学学报,2005,39(8):876-879. 被引量:7
  • 2Z.H.Zhou.J.X.Wu.W.Tang.Ensembling neural networks:Many could be better than all? Artificial Intelligence,2002,137 (1/2):239~263 被引量:1
  • 3Y.Liu,X.Yao.Ensemble learning via negative correlation.Neural Networks,1999,12(10):1399~1404 被引量:1
  • 4C.L.Blake,C.J.Merz.UCI repository of machine learning databases.http:// kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,1998 被引量:1
  • 5E.Biermann,E.Cloete,L.M.Venter.A comparison of intrusion detection systems.Computers and Security,2001,20 (8):676~683 被引量:1
  • 6T.Verwoerd,R.Hunt.Intrusion detection techniques and approaches.Computer Communications,2002,25 (15):1356 ~1365 被引量:1
  • 7D.Joo,T.Hong,I.Han.The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors.Expert Systems with Applications,2003,25 (1):69~ 75 被引量:1
  • 8A.Hyv(a)rinen,E.Oja.Independent component analysis:Algorithms and applications.Neural Networks,2000,13 (4-5):411 ~430 被引量:1
  • 9V.N.Vapnik.The Nature of Statistical Learning Theory.Berlin:Springer-Verlag,1995 被引量:1
  • 10周志华,陈世福.神经网络集成[J].计算机学报,2002,25(1):1-8. 被引量:245

共引文献197

同被引文献14

  • 1郭帆,余敏,叶继华.一种基于关联和代理的分布式入侵检测模型[J].计算机应用,2007,27(5):1050-1053. 被引量:6
  • 2黄炜,张伟.基于Agent与XML的分布式入侵检测系统模型[J].计算机安全,2007(6):18-20. 被引量:1
  • 3解永娟,王汝传,任勋益.基于SVM的入侵检测系统中特征权重优选方法综述[J].信息安全与通信保密,2007,29(8):126-129. 被引量:3
  • 4[1]CROSBIE M,SPFFORD E.Defending a computer system using automous agents,95-022[R].COAST Laboratory:Purdue University,1994. 被引量:1
  • 5[2]JANSEN W,MELL P,KARGIANNIS T,et al.Applying Mobile Agents to Intrusion Detection and Response[J].NISTIR 6416,September 1999. 被引量:1
  • 6[3]EUGENE H.SPAFFORD E,ZAMBONI D.Intrusion Detection Using Autonomous Agents[J].IEEE Computer Networks,2000,34(8):547-570. 被引量:1
  • 7[4]ASAKA M,OKAZAWA S.A Method of Tracing Intruders by Use of Mobile Agents[EB/OL].(2008-09-18).http://www.ipa.go.jplSTCIIDAlpaper/inet99.ps.gz. 被引量:1
  • 8[5]WANG Y X.Towards the automatic generation of mobile agents for distributed intrusion detection system[J].The Journal of Systems and Software,2006(79):1-14. 被引量:1
  • 9[6]CHATZIGIANNAKIS V,ANDROULIDAKIS G,GRAMMATIKOU M,et al.A distributed intrusion detection prototype using security agents[EB/OL].(2008-09-18).http://www.hpovua.org/publications/Proceedings/11 hpovuaws/hpov2004. 被引量:1
  • 10[7]MOSQUEIRA-REY E,ALONSO-BETANZOS A.A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture[J].N.T.Nguyen et al.(Eds.):KES-AMSTA 2007,(LNA14496):466-475. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部