2021年 01期

Intrusion Detection Algorithm Based on Minimum Rule Self-organizing Mapping


摘要(Abstract):

为了解决入侵检测模型中海量数据处理问题,降低计算复杂度,提高检测精度,提出基于最小规则自组织映射的入侵检测算法;通过在真实的入侵检测数据集上进行仿真实验,将该算法与普通椭圆补丁算法、简单矩形补丁算法以及决策树算法进行对比。结果表明,该算法在检测精度、稳定性和计算时间方面优于对比算法,验证了该算法的有效性。

关键词(KeyWords): 网络安全;入侵检测算法;自组织映射

基金项目(Foundation): 国家自然科学基金项目(61672328)

作者(Author): 张亦辉,刘振栋,单东方

DOI: 10.13349/j.cnki.jdxbn.20200826.001

参考文献(References):

[1] 陈希,罗齐贤,何海良.基于AP2DR2A+ET的企业信息安全框架研究[J].企业技术开发,2016,35(10):12-15,23.

[2] YANG Y,XU H Q,GAO L,et al.Multidimensional intrusion detection system for IEC 61850-based SCADA networks[J].IEEE Transactions on Power Delivery,2017,32(2):1068-1078.

[3] ZONOUZ S A,KHURANA H,SANDERS W H,et al.RRE:a game-theoretic intrusion response and recovery engine[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):395-406.

[4] NGUYEN H T,SRIBOONCHITTA S,WU B.A statistical basis for fuzzy engineering economics[J].International Journal of Fuzzy Systems,2015,17(1):1-11.

[5] 王贵君,何英,李晓萍.基于MISO折线模糊神经网络的优化算法[J].中国科学:信息科学,2015,45(5):650-667.

[6] CHEN L P,LIU Y G,HUANG Z X,et al.An improved SOM algorithm and its application to color feature extraction[J].Neural Computing and Applications,2014,24(7/8):1759-1770.

[7] SALEHI H,ZEINALI-HERIS S,ESFANDYARI M,et al.Erratum to:neuro-fuzzy modeling of the convection heat transfer coefficient for the nanofluid[J].Heat and Mass Transfer,2015,51(7):1049.

[8] 杨飞,李静,周亮.SOM图像分割算法在GPU上并行优化分析[J].控制工程,2019,26(9):1770-1775.

[9] ABDULKADIR H.A neuro-fuzzy two-stage clustering approach to customer segmentation[J].Journal of Marketing Analytics,2013,1(4):202-221.

[10] 杨雅辉,黄海珍,沈晴霓,等.基于增量式GHSOM神经网络模型的入侵检测研究[J].计算机学报,2014,37(5):1216-1224.

[11] 杜晔,张亚丹,黎妹红,等.基于改进FastICA算法的入侵检测样本数据优化方法[J].通信学报,2016,37(1):42-48.

[12] FIANNACA A,FATTA G D,RIZZO R,et al.Simulated anneal-ing technique for fast learning of SOM networks[J].Neural Computing and Applications,2013,22(5):889-899.

[13] 胡晓雪,赵嵩正,吴楠.基于SOM-DB-PAM混合聚类算法的电力客户细分[J].计算机工程,2015,41(10):295-301,308.

[14] RAHMAN M M.A soft image representat-ion approach by exploiting local neighborhood structure of self-organizing map (SOM)[J].Soft Computing,2016,20(7):2759-2769.

[15] INAYAT Z,GANI A,ANUAR N B,et al.Cloud-based intrusion detection and response system:open research issues,and solutions[J].Arabian Journal for Science and Engineering,2017,42(2):399-423.

[16] 刘开旻,吴小俊.一种基于新隶属度函数的模糊支持向量机[J].计算机工程,2016,42(4):155-159.

[17] 王鹏程,杨国栋,张晓晨,等.宝华玉兰生存群落的自组织特征映射网络排序与分类[J].浙江农林大学学报,2019,36(2):255-263.

[18] 周丽娟.基于自组织映射网络的网络入侵检测算法设计[J].成都大学学报(自然科学版),2018,37(3):296-298,302.