首页 | 本学科首页   官方微博 | 高级检索  
     

网络入侵异常检测中数据预处理的研究
引用本文:王晓晔,张涛,郝亚培. 网络入侵异常检测中数据预处理的研究[J]. 天津理工大学学报, 2013, 0(6): 31-35
作者姓名:王晓晔  张涛  郝亚培
作者单位:天津理工大学计算机与通信工程学院,天津300384
基金项目:国家自然科学基金(61170174)
摘    要:在网络入侵异常检测中,数据预处理是一个非常重要的步骤,数据预处理的好坏直接影响后续检测的准确性.本文针对基于层次聚类的网络入侵异常检测中两个问题,在数据预处理阶段做出改进,一是属性冗余和属性权重问题,运用粗集理论对各个属性赋予权重并进行属性约减,二是粗集理论中连续数据离散化问题,提出了针对数据特点的自适应离散化算法,该算法是根据样本属性值分布来决定离散间隔,最后针对两个改进方法进行了实验,并与采用现有离散化方法进行了对比,实验结果证明了该算法的有效性和准确性.

关 键 词:网络入侵异常检测  聚类  数据预处理  离散化

Data preprocessing on network intrusion anomaly detection
WANG Xiao-ye,ZHANG Tao,HAO Ya-pei. Data preprocessing on network intrusion anomaly detection[J]. Journal of Tianjin University of Technology, 2013, 0(6): 31-35
Authors:WANG Xiao-ye  ZHANG Tao  HAO Ya-pei
Affiliation:( School of Computer and Communication Engineering, Tianjin University of Technology, Tianjin 300384, China)
Abstract:In the network intrusion anomaly detection, data preprocessing is a very important component, it impacts on the accuracy of the follow - up detection. There are two problems in the network intrusion anomaly detection based on hierarchical clustering to solve in the preproeessing stage. First, It is attribute redundant and attribute weight problem. Using rough set theory computes the each attributes weights and reduces the attributes; Second, It is data discretion in rough set theory. This paper presents an adaptive discretization algorithm for data features. The algorithm determines the discrete intervals by the distribution of the value of the object's properties. Finally, experiments are conducted for these two improved methods, and compared with other representation discretization algorithms. The experimental results prove the validity and accuracy of the algorithm.
Keywords:network intrusion anomaly detection  clustering  data preprocessing  diseretization
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号