A hierarchical intrusion detection model based on the PCA neural networks

被引:92
作者
Liu, Guisong [1 ]
Yi, Zhang [1 ]
Yang, Shangming [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Compuatat Intelligence Lab, Chengdu 610054, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
intrusion detection; principal component analysis; hierarchical detection model; neural networks;
D O I
10.1016/j.neucom.2006.10.146
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of existing intrusion detection (ID) models with a single-level structure can only detect either misuse or anomaly attacks. A hierarchical ID model using principal component analysis (PCA) neural networks is proposed to overcome such shortages. In the proposed model, PCA is applied for classification and,neural networks are used for online computing. Experimental results and comparative studies based on the 1998 DARPA evaluation data sets are given, which show the proposed model can classify the network connections with satisfying performance. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1561 / 1568
页数:8
相关论文
共 24 条
[1]  
ANDERSON D, 1995, SRICSL9507
[2]  
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[3]  
[Anonymous], 2002, Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
[4]  
[Anonymous], 3 C SEC NETW ARCH LA
[5]  
[Anonymous], 2001, NEURAL NETWORKS COMP
[6]   TRACKING A FEW EXTREME SINGULAR-VALUES AND VECTORS IN SIGNAL-PROCESSING [J].
COMON, P ;
GOLUB, GH .
PROCEEDINGS OF THE IEEE, 1990, 78 (08) :1327-1343
[7]  
Diamantaras KI, 1996, Principal Component Neural Networks: Theory and Applications
[8]  
Ghosh AK, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P141
[9]  
Kohonen T, 2001, SELF ORG MAPS, DOI [10.1007/978-3-642-56927-2_1, DOI 10.1007/978-3-642-56927-2_1]
[10]   Dimension reduction using feature extraction methods for real-time misuse detection systems [J].
Kuchimanchi, GK ;
Phoha, VV ;
Balagani, KS ;
Gaddam, SR .
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, :195-202