Fusion of multiple classifiers for intrusion detection in computer networks

被引:128
作者
Giacinto, G [1 ]
Roli, F [1 ]
Didaci, L [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
intrusion detection in computer networks; pattern classification; multiple classifier systems; decision fusion;
D O I
10.1016/S0167-8655(03)00004-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have been currently developed. Intrusion Detection Systems aim at detecting intruders who elude "first line" protection. In this paper, a pattern recognition approach to network intrusion detection based on the fusion of multiple classifiers is proposed. Five decision fusion methods are assessed by experiments and their performances compared. The potentialities of classifier fusion for the development of effective intrusion detection systems are evaluated and discussed. (C) 2003 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1795 / 1803
页数:9
相关论文
共 22 条
[1]  
Allen J, 2000, CMUSEI99TR028
[2]  
[Anonymous], 1999, Combining Artificial Neural Nets: Ensemble and Modular Multi-Net Systems
[3]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI, DOI DOI 10.1145/846183.846199
[4]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]  
BONIFACIO JM, 1998, P IEEE WORLD C COMP
[6]  
CANNADY J, 2000, TESIS NOVA SE U
[7]  
Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
[8]  
GHOSH AK, 1999, P USENIX SEC S AUG 2
[9]   Combination of neural and statistical algorithms for supervised classification of remote-sensing images [J].
Giacinto, G ;
Roli, F ;
Bruzzone, L .
PATTERN RECOGNITION LETTERS, 2000, 21 (05) :385-397
[10]   Selection of image classifiers [J].
Giacinto, G ;
Roli, F ;
Fumera, G .
ELECTRONICS LETTERS, 2000, 36 (05) :420-422