Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Applications》 2010-03
Add to Favorite Get Latest Update

Intrusion detection based on supervised S-kv-Isomap algorithm

ZHENG Kai-mei1,2,QIAN Xu1 1.School of Mechanical Electronic & Information Engineering,China University of Mining & Technology Beijing,Beijing 100083,China 2.Information Engineering Department,China Institute of Defense Science and Technology,Beijing 101601,China  
Intrusion detection is still a hot area in computer security.When performing visualization and classification,the problem should be confronted is the high dimensionality.As one of the manifold learning algorithms Isomap is an effective nonlinear dimension reduction tool.However,when Isomap is applied to the real-world data,it shows some limitations,such as failing to guarantee connectedness of the constructed neighborhood graphs and not using the class labels of the data.An improved version of I-somap,namely S-kv-Isomap,is proposed.S-kv-Isomap utilizes class information to guide the dimension reduction procedure and k-variable method to build connected neighborhood graphs so as to enhance the robustness.The new scheme is evaluated with KDD CUP 1999 datasets in visualization and classification on four kinds of intrusion types:Dos,R2L,Probe,and U2R.Experiment results show that S-kv-Isomap performs best compared with kv-Isomap in visualization.In the classification test,S-kv-Isomap is compared with kv-Isomap,SVM,and k-NN.The results show that S-kv-Isomap performs higher detection rate and very low false positive rate.
【Fund】: 07教育部科学技术研究重点(重大)项目资助No.107021~~
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 XU Gao-cheng et al(College of Environment and Resource College,Southwest Science and Technology University,Mianyang,Sichuan 621010);Application of Supporting Vector Machine Technology in Extraction of Remote Sensing Image of Landslide[J];Journal of Anhui Agricultural Sciences;2009-06
2 GUAN Cui-ping (College of Life Science,Ningxia University,Yinchuan,Ningxia 750021);Recognition Prediction on G-Protein-Coupled-Receptors of Drug Target[J];Journal of Anhui Agricultural Sciences;2010-24
3 LIU Ting-ting(School of Software and Microelectronics,Beijing University,Beijing 100093);Research on Recognition of Rhizocotonia solani Based on Support Vector Machine[J];Journal of Anhui Agricultural Sciences;2011-28
4 GAO Chuang1,WANG Li-dong1,ZHOU Shi-yu2(1.School of Electronic and Information Engineering,University of Science and Technology Liaoning,Anshan 114051,China;2.AnGang Group New Hot-Rolled Co Ltd Hot-Rolled Strip Plaint,Anshan 114051,China);Classification of cervical cancer cell based on support vector machine and its application[J];Journal of University of Science and Technology Liaoning;2009-03
5 WANG Ting-hua,TIAN Sheng-feng,HUANG Hou-kuan,LIAO Nian-dong(School of Computer and Information Technology,Beijing Jiaotong University, Beijing 100044,China);Support Vector Machine Based on Weightiness of Sample Attribute[J];Journal of Beijing Jiaotong University;2007-05
6 SHANG Lei1,LIU Feng-jin2 (1. No. 17 Brigade of Graduate,Air Defense Forces Command Academy,Zhengzhou 450052,China;2. Command headquarter,Air Defense Artillery Brigade of Xinjiang Provincial Military Region,Urumchi 830017,China);Handwritten Number Recognition Based on Support Vector Machine[J];Ordnance Industry Automation;2007-03
7 Hu Shuyan Zheng Gangtie(School of Astronautics,Beijing University of Aeronautics and Astronautics,Beijing 100191,China);Driver fatigue prediction with eyelid related parameters by support vector machine[J];Journal of Beijing University of Aeronautics and Astronautics;2009-08
8 WANG ZiQiang DUAN AiLing ZHANG DeXian (School of Information Science and Engineering,Henan University of Technology,Zhengzhou Henan 450001,China);A support vector data description algorithm based on an adaptive kernel function[J];Journal of Beijing University of Chemical Technology(Natural Science Edition);2008-02
9 CHEN Zengzhao~(1,2)) YANG Yang~(1)) DONG Cailin~(2)) HE Xiuling~(1,2)) 1)Information Engineering School,University of Science and Technology Beijing,Beijing 100083,China 2)HE Xiuling The Center for Optimal Control & Discrete Mathematics,Central China Normal University,Wuhan 430079,China;A dynamical learning method with SVM and its application on bank slip recognition[J];Journal of University of Science and Technology Beijing;2006-02
10 GUO Hui,LIU Heping,WANG LingInformation Engineering School,University of Science and Technology Beijing,Beijing 100083,China;Kernel partial least squares based on least squares support vector machine primal-dual optimization problem[J];Journal of University of Science and Technology Beijing;2006-08
China Proceedings of conference Full-text Database 10 Hits
1 Xiukuan Zhao~(a,b,*),Min Li~b,Jinwu Xu~b,Gangbing Song~c ~aBeijing National Observatory of Space Environment,Institute of Geology and Geophysics,Chinese Academy of Sciences,Beijing 100029,China ~bSchool of Mechanical Engineering,University of Science and Technology Beijing,Beijing 100083,China ~cDepartment of Mechanical Engineering,University of Houston,Houston,TX 77204,USA;An effective procedure exploiting unlabeled data to build monitoring system[A];[C];2012
2 Wang Lianhong1,Zhang Guoyun 2,Zhang Jing1 1.College of Electrical and Information Engineering,Hunnan University,Changsha 410082,P.R.China2.Dept.of Physics and Electronics Information,Hunan Institute of Science and Technology,Yueyang,414006,P.R.China;A Novel Kernel PCA Support Vector Machine Algorithm with Feature Transition Function[A];[C];2007
3 Lv Peng1,Liu Yibing2,Ma Qiang2,Wei Yufan2 1.School of Mathematics and Physics,North China Electric Power University,Beijing 102206,P.R.China2.Department of automatics,North China Electric Power University,Beijing 102206,P.R.China;Gear Intelligent Fault Diagnosis Based on Support Vector Machines[A];[C];2007
4 Ma Wenxing1,Li Meng 1,2 1.Institute of Mechanical Science and Engineering,Jilin University,Changchun 130000,P.R.China 2.College of Mechanical Engineering,Changchun University,Changchun 130022,P.R.China;Fault Pattern Recognition of Rolling Bearings Based on Wavelet Packet and Support Vector Machine[A];[C];2008
5 Jiang Shaohua 1,2,Gui Weihua 1,Yang Chunhua 1,Tang Zhaohui1,Jiang Zhaohui1 1.School of Information Science and Engineering,Central South University,Changsha 410083,P.R.China 2.School of Information Science and Engineering,ShaoGuan University,ShaoGuan 512024,P.R.China;Method Based on Principal Component Analysis and Support Vector Machine and Its Application to Process Monitoring and Fault Diagnosis for Lead-Zinc Smelting Furnace[A];[C];2008
6 WANG Hai feng1,LI Zhuang1,REN Hong e2,ZHAO Peng21.School of Electronic and Information Engineering,Qiongzhou University,Sanya,Hainan 572022,P.R.China2.Information and Computer Engineering College,Northeast Forestry University,Harbin,150040,P.R.China;Texture Image Segmentation Algorithm Based on Nonsubsampled Contourlet Transform and SVM[A];[C];2010
7 ZHAO Baoyong~(1,2),QI Yingjian~3 1.School of Automation & Electrical Engineering,University of Science and Technology Beijing,Beijing 100083,P.R.China 2.Key Laboratory of Advanced Control of Iron and Steel Process,University of Science and Technology Beijing, Beijing 100083,P.R.China. 3.Science School,Communication University of China,Beijing 100024,P.R.China;Image Classification with Ant Colony Based Support Vector Machine[A];[C];2011
8 JIN Chaobu~1,HU Gangqiang~2,SHI Guangzhi~1,LI Yuyang~1 (1.Navy Submarine Academy Qingdao 266071,China; 2.92815 Army of PLA,Ningbo 315717,China);A underwater target recognition method using the support vector machines[A];[C];2011
9 Dai Mingyang~1,Yang Dali~1,Xu Mingxing~2 (1.School of Computer Science,Beijing Information Science & Technology University,Beijing 100101,China;2.Key Laboratory of Pervasive Computing,Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList) Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Research on the composition of UBM training set in speech emotion recognition[A];[C];2011
10 Dai Mingyang~1,Yang Dali~1,Xu Mingxing~2,Zhang Yongchao~2, Chen Sheng (1.School of Computer Science,Beijing Information Science & Technology University,Beijing 100101,China; 2.Key Laboratory of Pervasive Computing,Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNList) Department of Computer Science and Technology,Tsinghua University,Beijing 100084, China);Research on training speech selection for real emotion recognition[A];[C];2011
Chinese Journal Full-text Database 10 Hits
1 XIN Yang,WEI Jing-zhi,Niu Xin-xin,GU Yang(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);A Fast Multiple Pattern Matching Using in Intrusion Detection[J];Journal of Beijing University of Posts and Telecommunications;2008-03
2 YI Yao-hua,MEI Tian-can,QIN Qian-qing,GONG Jian-ya;Unsupervised Man-made Target Detection in Hyperspectral Images Using Projection Pursuit[J];Bulletin of Surveying and Mapping;2004-02
3 WU Bin,YANG Yi-xian,and ZHENG Kang-feng (State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications Haidian Beijing 100876);Analysis of Alert Correlation Based on Sequential Pattern in Intrusion Detection[J];Journal of University of Electronic Science and Technology of China;2009-03
4 YU Yan,HUANG Hao(Department of Computer Science and Technology,Nanjing University,State Key Laboratory for Novel Software Technology,Nanjing University.Nanjing,Jiangsu 210093,China);A Streaming Ensemble Intrusion Detection Model Based on Small Labeled Data[J];Acta Electronica Sinica;2007-02
5 ZHANG Hao,TAO Ran,LI Zhi-yong,CAI Zhen-he(School of Information Technology,Beijing Institute of Technology,Beijing 100081,China);A Research and Application of Feature Selection Based on KNN and Tabu Search Algorithm in the Intrusion Detection[J];Acta Electronica Sinica;2009-07
6 Yi Ping①② Liu Ning① Wu Yue① ①(School of Information Security Engineering,Shanghai Jiao Tong University,Shanghai 200030,China) ②(Key Laboratory of Child Development and Learning Science of Ministry of Education,Southeast University,Nanjing 210096,China);Intrusion Detection Based Timed Automata for Ad hoc Networks[J];Journal of Electronics & Information Technology;2009-10
7 TAN Lu,WU Yi,YI Dong-yun (College of Science, National Univ. of Defense Technology, Changsha 410073, China);Robust Locally Linear Embedding[J];Journal of National University of Defense Technology;2004-06
8 ZHANG Li~(1,2),GONG Dan-chao~1,HU Hai-yan~1 (1.Xi'an Research Institute of Surveying and Mapping,Xi'an 710054,China; 2.Institute of Surveying and Mapping,Information Engineering University,Zhengzhou 450052,China);Sequential Projection Pursuit of Hyperspectral Imagery Feature Extraction[J];Journal of Geomatics Science and Technology;2010-01
9 Mu Chengpo, Huang Houkuan, Tian Shengfeng, Lin Youfang, and Qin Yuanhui (School of Computer and Information Technology, Beijing Jiaotong University, Bei jing 100044);Intrusion-Detection Alerts Processing Based on Fuzzy Comprehensive Evaluation[J];Journal of Computer Research and Development;2005-10
10 Mao Guojun and Zong Dongjun(School of Computer Science, Beijing University of Technology, Beijing 100124);An Intrusion Detection Model Based on Mining Multi-Dimension Data Streams[J];Journal of Computer Research and Development;2009-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved