首页 | 官方网站   微博 | 高级检索  
     

基于模糊数据挖掘和遗传算法的网络入侵检测技术
引用本文:王晟,赵壁芳. 基于模糊数据挖掘和遗传算法的网络入侵检测技术[J]. 计算机测量与控制, 2012, 20(3): 660-663
作者姓名:王晟  赵壁芳
作者单位:1. 富国银行,西得梅因艾奥瓦州50266,美国
2. ASDI公司,纽瓦克特拉华州 19702,美国
摘    要:文章通过开发一套新的网络入侵检测系统来证实应用模糊逻辑和遗传算法的数据挖掘技术的有效性;这个系统联合了基于模糊数据挖掘技术的异常检测和基于专家系统的滥用检测,在开发异常检测的部分时,利用模糊数据挖掘技术来从正常的行为存储模式中寻找差异,遗传算法用来调整模糊隶属函数和选择一个合适的特征集合,滥用检测部分用于寻找先前行为描述模式,这种模式很可能预示着入侵,网络的通信量和系统的审计数据被用做两个元件的输入;此系统的系统结构既支持异常检测又支持滥用检测、既适用于个人工作站又可以适用于复杂网络。

关 键 词:入侵检测系统  异常检测  滥用检测  遗传算法

Network Intrusion Detection Based on Fuzzy Data Mining and Genetic Algorithms
Wang Cheng , Zhao Bifang. Network Intrusion Detection Based on Fuzzy Data Mining and Genetic Algorithms[J]. Computer Measurement & Control, 2012, 20(3): 660-663
Authors:Wang Cheng    Zhao Bifang
Affiliation:1.Wells Fargo Bank,West Des Moines 50266,USA;2.ASDI Inc,West Des Moines 19702,USA)
Abstract:We have developed a prototype intelligent intrusion detection system in order to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms.This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques.The anomaly-based components are developed using fuzzy data mining techniques.They look for deviations from stored patterns of normal behavior.Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features.The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion.Both network traffic and system audit data are used as inputs for both components.This system architecture supports both anomaly detection and support for abuse detection,both for personal workstation can be applied to complex networks.
Keywords:intrusion detection system  anomaly detection  misuse detection  genetic algorithms
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号