首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
刘明珍 《计算机工程》2013,(11):131-135
为提高网络入侵检测效果,提出一种结合混沌粒子群优化(CPSO)算法和最小二乘支持向量机(LSSVM)的网络入侵检测模型。将网络特征和LSSVM参数编码成二进制粒子,根据网络入侵检测正确率和特征子集维数权值构造粒子群目标函数。通过粒子群找到最优特征子集和LSSVM参数,同时引入混沌机制保证粒子群的多样性,防止早熟现象的出现,从而建立最优网络入侵检测模型。采用KDD99数据集进行性能测试,结果表明,该模型不仅能获得最优特征子集和LSSVM参数,而且提高了入侵检测速度和正确率,降低了入侵检测误报率和漏报率。  相似文献   

2.
基于粒子群LSSVM的网络入侵检测   总被引:1,自引:0,他引:1  
研究保护网络安全问题,计算机网络攻击的多样性及隐蔽性导致网络入侵检测困难.当前流行的人工神经网络检测方法的网络入侵检测率仅70%左右,不能满足网络安全防护需求,为了解决上述问题,提出基于最小二乘支持向量机和粒子群优化算法(PSO-LSSVM)的网络入侵检测方法,粒子群优化算法用于选择合适的最小二乘支持向量机参数.方法泛化能力强,识别精度高.在网络入侵检测中,通过KDDCup99数据库数据进行仿真,证明方法的优越性.实验结果表明粒子群优化算法与最小二乘支持向量机组合方法的网络入侵检测精度优于LSSVM与SVM.可见,PSO-LSSVM非常适合于网络入侵检测,可为网络保护设计提供参考.  相似文献   

3.
笔者针对网络特征选择问题,提出一种鲶鱼粒子群算法选择特征的支持向量机网络入侵检测(EPSO-SVM)。首先将"鲶鱼效应"因子引入粒子群优化算法,将网络特征子集编码成粒子位置串,其次将入侵检测率作为特征子集选择目标函数,通过鲶鱼粒子群找到最优特征子集,最后支持向量机根据最优特征子集构建网络入侵分类器,在KDDCup99数据集上进行仿真测试。结果表明,EPSO-SVM不仅能提高网络入侵检测率和检测速度,而且适用于现实高速网络应用环境。  相似文献   

4.
为了提高网络入侵检测率,提出一种反向学习粒子群算法和多层次分类器相融合的网络入侵检测模型。首先将反向学习粒子群算法优化最小二乘支持向量机,以提高分类性能;然后利用由粗到精策略构造多层的网络入侵分类器降低计算时间杂度复;最后采用KDD 99数据集进行仿真测试。仿真结果表明,相对于其他检测模型,该模型不仅提高了网络入侵检测率,降低了入侵检测误报率,同时加快了入侵检测速度,为网络安全提供了有效保证。  相似文献   

5.
特征选择是网络入侵检测研究中的核心问题,为了提高网络入侵检测率,提出一种人工鱼群算法(AFSA)和支持向量机(SVM)相融合的网络入侵检测模型(AFSA-SVM)。将网络特征子集编码成人工鱼的位置,以5折交叉验证SVM训练模型检测率作为特征子集优劣的评价标准,通过模拟鱼群的觅食、聚群及追尾行为找到最优特征子集,SVM根据最优特征子集进行网络入侵检测,并采用KDD CUP 99数据集进行仿真测试。仿真结果表明,相对于粒子群优化算法、遗传算法和原始特征法,AFSA-SVM提高了入侵检测效率和检测率,是一种有效的网络入侵检测模型。  相似文献   

6.
论文针对标准量子粒子群算法易陷入局部极值的问题,提出一种改进的量子粒子优化最小二乘支持向量机的方法。利用高斯变异数的局部开发能力以及柯西变异数的全局搜索能力,在量子粒子群优化算法中,引入高斯-柯西变异算子,帮助算法跳出局部极值。并利用该优化模型进行光伏发电量预测实验,对优化的最小二乘支持向量机模型的预测结果与其他模型预测结果进行比较,结果表明:基于高斯-柯西变异算子的量子粒子群优化的最小二乘支持向量机对光伏发电量的预测具备较好的收敛速度和跳出局部收敛困境的能力。  相似文献   

7.
网络入侵检测一直是网络安全领域中的研究热点,针对分类器参数优化难题,为了提高网络入侵检测准确性,提出一种改进粒子群算法和支持向量机相融合的网络入侵检测模型(IPSO-SVM).首先将网络入侵检测率作为目标函数,支持向量机参数作为约束条件建立数学模型,然后采用改进粒子群算法找到支持向量机参数,最后采用支持向量机作为分类器建立入侵检测模型,并在Matlab 2012平台上采用KDD 999数据进行验证性实验.结果表明,IPSO-SVM解决了分类器参数优化难题,获得更优的网络入侵分类器,提高网络入侵检测率,虚警率和漏报率大幅度下降.  相似文献   

8.
入侵检测系统面临的主要问题是计算量大,特征选择被引入解决这一问题。针对现有方法的缺点,利用改进的粒子群算法来搜索最优特征子集,提出了一种基于混合CatfishPSO和最小二乘支持向量机的特征选择方法,利用混合的CatfishBPSO和CatfishPSO选择特征子集并同步对LSSVM的参数进行优化,最后建立了一个基于该特征选择方法的入侵检测模型。在KDD Cup 99数据集上进行的实验结果表明该模型的检测性能较高。  相似文献   

9.
迟滞系统广泛存在于各工程领域,但由于迟滞非线性系统的不确定性、状态不可测等特性,因此迟滞系统在建模方面存在一定的困难。针对上述问题,提出了一种采用最小二乘支持向量回归机的解决方案,对系统进行建模方法的研究,并利用粒子群算法、量子粒子群算法等对最小二乘支持向量机中的惩罚参数γ和核函数参数σ的组合进行优化,以提高模型性能及泛化能力。仿真结果表明,利用粒子群优化算法的最小二乘支持向量回归机对迟滞系统的模型仿真可以得到较好的结果。  相似文献   

10.
网络攻击具有多样性和隐蔽性,为了提高网络安全性入侵检测的正确率,提出一种混沌粒子群算法(CPSO)和最小二乘支持向量机(LSSVM)相融合的网络入侵检测方法(CPSO-LSSVM)。利用混沌粒子群算法对LSSVM模型参数进行搜索,选择LSSVM最优参数,采用KDDCUP99数据集对CPSO-LSSVM性能进行测试,实验结果表明,CPSO-LSSVM提高了网络入侵检测正确率,降低了误报率,可以为网络安全提供有效保证。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

13.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

14.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

15.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

17.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

18.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

19.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号