Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Applications》 2003-07
Add to Favorite Get Latest Update

Comparison and Analysis of Two Audit Data Reduction Methods for Intrusion Detection System

ZOU Tao 1,2,SUN Hongwei1,2,TIAN Xinguang1,2,LI Xuechun2(1.College of Electronic Science and Engineering,National University of Defense Technology,Changsha Hunan 410073,China;2.IP Network Technology Institute of Beijing Capitel Co.,Ltd.,Beijing 100016,China)  
This paper addresses the issue of identifying important input features in building an intrusion detection system (IDS). An algorithm named PFRM was first introduced and then a new algorithm (FSSGA) based on GA is proposed. The characteristics of both algorithms were analyzed. The experimental result using the same dataset shows that the performance of FSSGA is much better than PFRM. 
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 3 Hits
1 Chen Xiang(Department of Computer Science,Guangxi Vocational Technical Institute of Industry,Nanning 530001);Research of host-feature selection in anomaly detection based on SVM-RFE[J];Electronic Measurement Technology;2007-11
2 ZOU Tao,SUN Hong-wei,TIAN Xin-guang,ZHANG Er-yang(College of Electronic Science and Engineering,National Univ. of Defense Technology,Changsha 410073,China);Data Reduction in Network Based on the Intrusion Detection System[J];Journal of National University of Defense Technology;2003-06
3 Wang Yong 1,2 Yang Huihua 1,2 Wang Xingyu 1 He Qian 21 (College of Information,East China University of Science&Technology,Shanghai200237) 2 (Guilin University of Electronic Technology,Guilin541004);Linux-hosted Intrusion Detection System Using Least Square Support Vector Machines[J];Computer Engineering and Applications;2005-02
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 CHEN Shu-yan~1,QU Gao-feng~2 (1.Jiangsu Province Optoelectronics Important Laboratory,Nanjing Normal University,Nanjing 130024,China; 2.Department of Computer Science,Southeast University,Nanjing 210096,China);Random stock model based on evolutionary strategies[J];Journal of Northeast Normal University (Natural Science Edition);2003-04
2 Luo Yunxia;Zhou Muxun;Jiang Zhendong;Chen Yongbao Zhejiang College of Water Conservancy and Hydropower, Hangzhou 310016, China Zhejiang University of Technology, Hangzhou 310014, China Shafan Reservoir Management Department, Jinhua 321061, China Jinlan Reservoir Management Department, Jinhua 321061, China;OPTIMAL OPERATION OF SERIES SMALL HYDROPOWER STATIONS BASED ON IMPROVED GENETIC ALGORITHM[J];Dam Observation and Geotechnical Tests;2004-03
3 WANG Xin-xin, XU Xiang-dong;Research on General Frame Model of Evolutionary Optimization Algorithm[J];Power System Engineering;2002-02
4 Lü Kui~(1,2),WANG Xia~(1,2)(1. Department of Physics, Shangrao Normal College, Shangrao 334000,China; 2. Department of Physics, Zhejiang University, Hangzhou 310028, China);A parameter inversion identification method based on genetic algotrthms[J];College Physics;2004-03
5 MIAO Hai-yang, CHENG Ji-lin, JIANG Jian-hua, YAN Wei(Water Science and Engineering College, Yangzhou University, Yangzhou 225009, China);Application of an Improved Genetic Algorithms in Hydraulic Distribution Calculation of Loop Pipe Network[J];Journal of Irrigation and Drainage;2005-02
6 JIANG Zhiquan, CHEN Yan(Computer Science & Technol. College,Dalian Maritime Univ., Dalian 116026,China);Research of an association rules discovering model based on Genetic Algorithm[J];Journal of Dalian Maritime University;2003-03
7 Xu Hongtao, Lu Wenbo (State Key Laboratory of Water Resources and Hydropower Engineering Science, Wuhan University,Wuhan 430072,China);Application of Genetic Algorithm in the Optimization of Parameters in Engineering Blasting[J];Engineering Science;2005-01
8 SONG Li-Ming FENG Zhen-Ping LI Jun LIU Li (School of Eergy & Power Engineering, Xi'an Jiaotong University, Xi'an 710049, China);A METHOD FOR TWIST BLADE DESIGN WITH ELLIPTIC EQUATIONS[J];Journal of Engineering Thermophysics;2004-S1
9 LIU Bing-bing~1 (1.Department of Mathematics, Anqing Teachers College, Anqing, Anhui 246133, China);Hybrid genetic algorithm of global optimization for a sort of nonlinear bilevel mixed integer-programming problem[J];Journal of Yanshan University;2007-06
10 Liu Fanmao Chen Xin Tang Ting'an Chen Xindu;A Realize of Chromosome Coding in Genetic Algorithms Applied to Job Shop Scheduling[J];Computer Study;2003-05
China Proceedings of conference Full-text Database 2 Hits
1 LIU Bing-bing Department of Mathematics, Anqing Teachers College. Anqing 246011, China;The hybrid genetic algorithm of Global Optimization for a Sort of Nonlinear Bilevel Mixed Integer-programming Problem[A];[C];2006
2 Du Xiu-li Wang Zhihui Li Liyun Hou Shiwei (The Key Laboratory of Urban Security and Disaster Engineering (Beijing University of Technology ), Ministry of Education. Beijing 100022);A SIMPLEX-EMPIRICAL GENETIC ALGORITHM TO CALCULATE THE INTERIOR STABLILITY OF SOIL-NAILED STRUCTURE[A];[C];2006
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 LIU Hai-feng,QING Si-han,Meng Yang,LIU Wen-qing (Institute of Software Chinese Academy of Sciences,Beijing 100080,China;Engineering Research Center for Information Security Technology Chinese Academy of Sciences,Beijing 100080,China);A New Audit-Based Intrusion Detection Model and Its Implement Mechanism[J];Acta Electronica Sinica;2002-08
2 XU Man-jiang~1,CAO Yuan-da~2 (1.Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China; 2.School of Computer Software, Beijing Institute of Technology, Beijing100081, China);Design and Implementation of an Intrusion Detection System Using System Call Serial Analysis[J];Journal of Beijing Institute of Technology;2004-04
3 YAO Li hong,ZI Xiao chao,HUANG Hao,MAO Bing,XIE Li (State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China; Department of Computer Science and Technology,Nanjing University,Nanjing,Jiangsu 210093,China);Research of System Call Based Intrusion Detection[J];Acta Electronica Sinica;2003-08
4 CAI Zhong Min GUAN Xiao Hong SHAO Ping PENG Qin Ke SUN Guo Ji (Center for Networked Systems and Information Security, System Engineering Institute, Xi′an Jiaotong University, Xi′an 710049);A New Approach to Intrusion Detection Based on Rough Set Theory[J];Chinese Journal of Computers;2003-03
5 Yan Hui Cao Yuanda(Dept.of Computer Science and Engineering,Beijing Institute of Technology,Beijing100081);An Intrusion Statistic-based Anomaly Detection Method[J];Computer Engineering and Applications;2002-22
6 YAO Li-Hong HUANG Hao XIE Li (Department of Computer Secience and Technology , Nanjing University ,Nanjing 210093) (State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing 210093);A Intrusion Detection Model STGIDM Based on State Transition Graph[J];Computer Science;2003-11
7 LI Hui, GUAN Xiao-Hong, ZAN Xin, and HAN Chong-Zhao (Center for Networked Systems and Information Security, State Key Laboratory of Manufacturing Systems, at Xi'an Jiaotong University, Xi'an 710049);Network Intrusion Detection Based on Support Vector Machine[J];Journal of Computer Research and Development;2003-06
8 Yang Wu1, Yun Xiaochun 1,2, and Li Jianhua 1,3 1(Research Center of Information Security, Harbin Engineering University, Harbin 150001) 2(Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001) 3(College of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 201203);An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J];Journal of Computer Research and Development;2006-07
9 Yao Chunsheng Liu Hui Cai Lidong (Department of Computer Science,Jinan University,Guangzhou Guangdong 510632,China);INTRUSION DETECTION BASED ON TRANSFER PROBABILITY IN SEQUENCES OF SYSTEM CALLS[J];Computer Applications and Software;2005-03
10 GUO Hong-gang~(1, 2), FANG Min~(1, 2)71, China; 2. Institute of Computer Science, Xidian University, Xi'an Shaanxi 710071, China);Application of AdaBoost method in IDS[J];Computer Applications;2005-01
【Secondary References】
Chinese Journal Full-text Database 3 Hits
1 WANG Yong1,2, ZHANG Xijun3, YANG Huihua1,2, WANG Xingyu2 (1. Network Information Center, Guilin University of Electronic Technology, Guilin 541004; 2. College of Information Science and Engineering, East China University of Science & Technology, Shanghai 200237; 3. Guilin Reform and Development Committee, Guilin 541001);Windows Host Intrusion Detection Experimental System[J];Computer Engineering;2006-10
2 ZHANG Hongmei 1,2,WANG Yong 1,2,WANG Xingyu 1(1.School of Information Science and Engineering,East China University of Science & Technology,Shanghai 200237;2.Network Information Center,Guilin University of Electronic Technology,Guilin 541004);Network-based Intrusion Detection System Using Rough Set[J];Computer Engineering;2006-19
3 ZHANG Bin~1,WANG Tong~1,GU Chuan-gang~1,DAI Zheng-yuan~2(1.Key Laboratory for Power Machinery and Engineering(the Ministry of Education),Shanghai JiaotongUniversity,Shanghai,200240,China;2.Trane's Asia-Pacific Research Center, Shanghai 200001,China);Algorithm of Reducing the Sample Size of Turbulent Experiment Based on Wavelet Analysis[J];Journal of Shanghai Jiaotong University;2008-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved