首页 | 本学科首页   官方微博 | 高级检索  
     

基于模糊聚类分析的入侵检测方法
引用本文:朱卫未,王卫平,梁樑. 基于模糊聚类分析的入侵检测方法[J]. 系统工程与电子技术, 2006, 28(3): 474-477
作者姓名:朱卫未  王卫平  梁樑
作者单位:中国科学技术大学信息管理与决策科学系,安徽,合肥,230052
摘    要:提出了一种新的基于模糊聚类分析的入侵检测数据处理方法,该方法能够较为准确地区分正常和入侵进程,具有计算速度快、耗用资源少等特点。通过使用模糊聚类,还可以提炼出精简准确的分类规则。由于对数据中的孤立点采用了特殊的处理方法,因此对产生聚类规则的训练数据库进行添加和更新,该检测方法具有较强的可扩展性。通过仿真实验证明了该算法的有效性。

关 键 词:模糊聚类  入侵检测  数据处理
文章编号:1001-506X(2006)03-0474-04
修稿时间:2004-12-17

Intrusion detection method based on fuzzy cluster analysis
ZHU Wei-wei,WANG Wei-ping,LIANG Liang. Intrusion detection method based on fuzzy cluster analysis[J]. System Engineering and Electronics, 2006, 28(3): 474-477
Authors:ZHU Wei-wei  WANG Wei-ping  LIANG Liang
Abstract:A fuzzy cluster algorithm(FCM) based data processing method for intrusion detection is introduced and some changes for the data characteristic are made.The experimental results show that the method is effective to differentiate the normal process and the intrusion process correctly in some degree.It also has the merits of faster computation and less resource utilization.The concise classification rules are derived with this new method.Because of the special treatment of the isolated points in the data and easy renewal or supplemmet of the classification rule set,this detection method has a strong extensibility.Simulation results illustrate that this algorithm is very efficient.
Keywords:FCM  intrusion detection  data processing  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号