作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (3): 88-90. doi: 10.3969/j.issn.1000-3428.2008.03.031

• 软件技术与数据库 • 上一篇    下一篇

基于孤立点挖掘的入侵检测技术

黄 斌,史 亮,姜青山,吴楠楠   

  1. (厦门大学软件学院,361005)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-02-05 发布日期:2008-02-05

Intrusion Detection Technology Based on Outlier Mining

HUANG Bin, SHI Liang, JIANG Qing-shan, WU Nan-nan   

  1. (Software School, Xiamen University, Xiamen 361005)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-02-05 Published:2008-02-05

摘要: 基于孤立点挖掘,探讨了异常检测的可行性,将孤立点挖掘方法应用到入侵检测中,采用编码映射方法对符号型数据进行处理,利用主成分分析对编码映射后扩展的属性进行降维。仿真实验验证了该方法的可行性。

关键词: 入侵检测, 孤立点, 相似系数, 编码映射, 主成分分析

Abstract: This paper discusses feasibility of anomaly detection based on outlier mining, presents an anomaly detection method by using an outlier detection method based on similar coefficient sum. It transforms the character feature into numerical value by code mapping, and uses Principal Components Analysis(PCA) to reduce dimension. Implementation method is proposed, feasibility of the method is proved.

Key words: intrusion detection, outlier, similar coefficient, code mapping, Principal Components Analysis(PCA)

中图分类号: