期刊文献+

基于遗传模糊分类器的入侵检测系统研究 被引量:6

Research on Genetics Fuzzy-Based Rule Classifier in Intrusion Detection System
在线阅读 下载PDF
导出
摘要 入侵检测技术已成为网络安全领域研究的焦点.文中将模糊理论与遗传算法相结合,利用模糊集合理论搜索优化的特征模糊集,提出了一类基于模糊关联规则的分类器,并用遗传算法对分类器的模糊规则库进行优化,构建高效的入侵检测系统.仿真测试证明了系统的有效性. Intrusion detection technique has become the focus in the area of network security research. The paper incorpo- rate fuzzy logic and genetic algorithms into the classifying system based on fuzzy association rule, and utilize genetic algo- rithrns to optimize the classifier, Experiment results indicate the efficiency of the algorithm.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第4期26-28,32,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(60674088) 福建省教育厅科技基金项目(JA05300)
关键词 遗传算法 入侵检测 模糊规则 软计算 genetic algorithms intrusion detection fuzzy rule soft computing
作者简介 周豫苹 女,(1976-),博士研究生,讲师.研究方向为计算机网络、数据挖掘,CCF会员. 方建安 男,(1966-),教授、博士生导师.研究方向为智能控制、计算机网络、混沌理论. 于冬梅 女,(1975-),博士研究生.研究方向为智能控制、计算机网络.
  • 相关文献

参考文献8

二级参考文献44

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2JAMES Cannady. Artificial Neural Networks for Misuse Detedtion[ C]. NISSC'98,1998.
  • 3XIN Jiangqing, ICKERSON John E, DICKERSON Julie A. Fuzzy Feature Extraction and Visualization for Intrusion Detection [ C ]. The IEEE International Conference On Fuzzy Systems, 2003. 1249 -1254.
  • 4LIU Min, LING Yean Yng. Using Fuzzy Neural Network Approach to Estimate Contractor' s Markup [ J ]. Building and Enviroment, 2003, 38:1303 - 1308.
  • 5JUANG Chia- feng. Temporal Problem Solved by Dynamic Fuzzy Network Based on Genetic Algorithm with Varible -length Chuomosomes[ J].Fuzzy Sets and Systems, 2004,142:199 - 219.
  • 6BRIDGES Susan, VAUGHN Rayford. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection[ C]. Proceedings Twenty Third National Information Security Conference, October. 2000, 1-19.
  • 7ISHIBUCHIi Hy, NAKASHIMA T. Linguistic Rule Extraction by Genetic - based Machine Learning [ C ]. Proceedings Genetic and Evolutionary Computation Conference GECCO00,2000.
  • 8REITH M,CARR C.An examination of digital forensics models[J].Journal of Digital Evidence,2002,1(3):1-12.
  • 9MARCUS K,KATE S.The future of computer forensics:a needs analysis survey[J].Computers & Security,2004,1(23):12-16.
  • 10SARAH M.Building theoretical underpinnings for digital forensics research[J].Digital Investigation,2004,1(1):61-68.

共引文献26

同被引文献23

  • 1姚伟祥,吴龙标,卢结成.基于模糊神经网络的火灾信号处理[J].人类工效学,1999,5(1):6-9. 被引量:3
  • 2孙知信,徐红霞.模糊技术在入侵检测系统中的应用研究综述[J].南京邮电大学学报(自然科学版),2006,26(4):73-78. 被引量:14
  • 3危胜军,胡昌振,孙明谦.基于模糊Petri网的误用入侵检测方法[J].北京理工大学学报,2007,27(4):312-317. 被引量:7
  • 4K. Diamantaras, S.Y. Kung, Principal Component Neural Networks:Theory and Applications, Wiley, NY, USA, 1996.
  • 5KDD Cup Data, hhttp://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,i March, 2006.
  • 6K. Diamantaras, S.Y. Kung, Principal Component Neural Networks: Theory and Applications[M], Wiley, NY, USA, 1996.
  • 7KDD Cup Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html[EB/OL], March 2006.
  • 8Lofti A Zadeh. Fuzzy logic, neural networks and soft computing[ D]. Berkeley: University of California 1992.
  • 9Grace A. Optimization toolbox user's guide[M]. Natick: The MathWorks, Inc. 1996.
  • 10吴荣刚.浅谈大型仓储式超市的火灾特点及其建筑防火设计[C]."消防专业与消防工程实践"学术论坛,2005,(9):177-179.

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部