首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于模糊数据挖掘的网络入侵检测模型
引用本文:陈慧萍[,] 王建东 叶飞跃 王煜.基于模糊数据挖掘的网络入侵检测模型[J].南京航空航天大学学报(英文版),2005,22(3):247-251.
作者姓名:陈慧萍[  ] 王建东 叶飞跃 王煜
作者单位:[1]南京航空航天大学信息科学与技术学院,中国南京210016 [2]河海大学信息工程学院,中国常州213022
基金项目:国家“九七三”计划(G1999032701)资助项目
摘    要:提出了一个基于模糊数据挖掘的入侵模型.异常检测的一个主要问题是正常模式随时间变化.如果一个实际的入侵行为稍有偏差就有可能与正常的模式相匹配,而异常检测系统则无法检测到这种入侵行为.为解决这个问题,本文利用模糊数据挖掘技术建立正常模式,并用一组模糊关联规则表示.在进行异常检测时,利用新的审计数据挖掘当前模糊关联规则,并计算其与正常模式的相似度,如相似度低于规定的阈值,使其产生入侵警报.最后,文中利用遗传算法优化模糊成员函数来选择其参数.

关 键 词:入侵检测  数据挖掘  模糊逻辑  遗传算法  异常检测
收稿时间:07 6 2004 12:00AM
修稿时间:03 18 2005 12:00AM

INTERNET INTRUSION DETECTION MODEL BASED ON FUZZY DATA MINING
CHEN Hui-ping, WANG Jian-dong, YE Fei-yue, WANG Yu.INTERNET INTRUSION DETECTION MODEL BASED ON FUZZY DATA MINING[J].Transactions of Nanjing University of Aeronautics & Astronautics,2005,22(3):247-251.
Authors:CHEN Hui-ping  WANG Jian-dong  YE Fei-yue  WANG Yu
Institution:1. College of Information Science and Technology, NUAA 29 Yudao Street, Nanjing, 210016, P.R. China; 2. College of Information Engineering, Hehai University, Changzhou, 213022, P. R. China
Abstract:An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of "normal behaviors". To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from "normal" data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features.
Keywords:intrusion detection  data mining  fuzzy logic  genetic algorithm  anomaly detection
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号