透過您的圖書館登入
IP:3.146.152.99
  • 期刊

一個混合式的分類演算法應用於入侵偵測系統

A Hybrid Classification Algorithm for Intrusion Detection System

摘要


入侵偵測系統可以被視為網路管理系統中,用於檢查與警示異常網路行為之子系統。隨著網際網路發展以及網路架構複雜程度增加,許多不同的攻擊方式因此而產生。傳統的入侵偵測系統,無法有效地偵測出這些攻擊,因此本研究提出一個混合式的分類演算法應用於入侵偵測系統,提高系統判斷異常攻擊行為的準確度,並減少分類演算法的計算時間。這個方法結合k-means分群演算法、支持向量機分類演算法以及搜尋經濟學超啟發式演算法。實驗結果說明利用這個混合式的策略,可以讓入侵偵測系統在較複雜的網路攻擊分類問題上,提供較高的準確度。

並列摘要


An intrusion detection system (IDS), which can be regarded as a subsystem of a network management system, plays the role of detecting and preventing abnormal network behaviors. With the advance of the Internet and the increase of the complexity of network architectures, many attack methods have been developed. However, most traditional intrusion detection systems are incapable of recognizing these attacks. Therefore, this study will present a hybrid classification algorithm for an intrusion detection system to improve its accuracy rate and reduce its computation time. The proposed algorithm integrates k-means (a clustering algorithm), support vector machine (a classification algorithm), and search economic (a metaheuristic algorithm). The experimental results show that the proposed hybrid algorithm provides a better accuracy rate in solving complex network attack classification problems.

參考文獻


W. Stallings and L. Brown, Incident Response: Computer Security Principles and Practice, Prentice Hall Press, 2014.
A. Mairh, D. Barik, K. Verma and D. Jena, “Honeypot in network security: A survey,” in Proceedings of the International Conference on Communication, Computing & Security, pp. 600-605, 2011.
A. Patel, M. Taghavi, K. Bakhtiyari and J. C. Júnior, “An intrusion detection and prevention system in cloud computing: A systematic review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 25-41, 2013.
H. J. Liao, C. H. R. Lin, Y. C. Lin and K. Y. Tung, “Intrusion detection system: A comprehensive review,” Network and Computer Applications, vol. 36, no. 1, pp. 16-24, 2013.
T. F. Lunt, “A survey of intrusion detection techniques,” Computers & Security, vol. 12, no. 4, pp. 405-418, 1993.

延伸閱讀