Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2008, Vol. 34 ›› Issue (3): 88-90. doi: 10.3969/j.issn.1000-3428.2008.03.031

• Software Technology and Database • Previous Articles     Next Articles

Intrusion Detection Technology Based on Outlier Mining

HUANG Bin, SHI Liang, JIANG Qing-shan, WU Nan-nan   

  1. (Software School, Xiamen University, Xiamen 361005)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-02-05 Published:2008-02-05

基于孤立点挖掘的入侵检测技术

黄 斌,史 亮,姜青山,吴楠楠   

  1. (厦门大学软件学院,361005)

Abstract: This paper discusses feasibility of anomaly detection based on outlier mining, presents an anomaly detection method by using an outlier detection method based on similar coefficient sum. It transforms the character feature into numerical value by code mapping, and uses Principal Components Analysis(PCA) to reduce dimension. Implementation method is proposed, feasibility of the method is proved.

Key words: intrusion detection, outlier, similar coefficient, code mapping, Principal Components Analysis(PCA)

摘要: 基于孤立点挖掘,探讨了异常检测的可行性,将孤立点挖掘方法应用到入侵检测中,采用编码映射方法对符号型数据进行处理,利用主成分分析对编码映射后扩展的属性进行降维。仿真实验验证了该方法的可行性。

关键词: 入侵检测, 孤立点, 相似系数, 编码映射, 主成分分析

CLC Number: