GHSOM intrusion detection based on Dempster-Shafer theory
Academic paper|更新时间:2024-06-05
|
GHSOM intrusion detection based on Dempster-Shafer theory
Journal on CommunicationsVol. 36, Issue Z1, Pages: 60-64(2015)
作者机构:
哈尔滨理工大学 计算机科学与技术学院,黑龙江 哈尔滨 150080
作者简介:
基金信息:
The Natural Science Foundation of Heilongjiang Province(A201301);Scientific Planning Issues of Education in Heilongjiang Province(GBC1211062);Research Fund for the Program of New Century Excellent Talents in Heilongjiang Provincial University(1155-ncet-008);Post Doctoral Fund of Heilongjiang(LBH-Z12082)
Jie SU, Wei-wei DONG, Xuan XU, et al. GHSOM intrusion detection based on Dempster-Shafer theory[J]. Journal on Communications, 2015, 36(Z1): 60-64.
DOI:
Jie SU, Wei-wei DONG, Xuan XU, et al. GHSOM intrusion detection based on Dempster-Shafer theory[J]. Journal on Communications, 2015, 36(Z1): 60-64. DOI: 10.11959/j.issn.1000-436x.2015282.
GHSOM intrusion detection based on Dempster-Shafer theory
the GHSOM neural network intrusion detection based on the theory of evidence reasoning method was put forward.It can deal with the uncertainty caused by randomness and fuzziness
as well as can constantly narrowing assumptions set by accumulate the evidence
effectively control dynamic growth of network and keep a good accuracy in noise environment.Experiments show that GHSOM intrusion detection method based on the Dempster Shafer theory realized the dynamic control for the scale of expended subnet during the process of detection.It has the better detection accuracy in the noise environment and improves the adaptability and extensibility of incremental GHSOM neural network intrusion detection method when the scale of network is expanded.
关键词
Keywords
references
LUO Z Y , YOU B , XU J Z , et al . Attack graph algorithm in the application of intrusion detection system [J ] . International Journal of Security and its Applications , 2013 ,( 9 ): 249 - 256 .
LUO Z Y , YOU B , YU G H , et al . Research of intrusive intention self-recognition algorithm based on three-tier attack graph [J ] . ICIC Express Letters,Part B:Applications , 2015 ,( 1 ): 1575 - 1580 .
YANG S L , YANG Y H , SHEN Q N , et al . A method of intrusion detection based on semi-supervised GHSOM [J ] . Journal of Computer Research and Development , 2013 , 50 ( 11 ): 2375 - 2382 .
YANG Y H , JIANG D B , SHEN Q N , et al . Research on intrusion detection based on an improved GHSOM [J ] . Journal on Communications , 2011 , 32 ( 1 ): 121 - 126 .
ZELL A , BAYER H , BAUKNECHT H . Similarity analysis of molecules with self-organizing surfaces—an extension of the self- organizing map [A ] . Proceedings of the International Conference on Neural Networks [C ] . 1994 . 719 - 724 .
DENG D , KASABOV N . ESOM:an algorithm to evolve selforganizing maps from on-line data streams [A ] . Proceedings of the International Joint Conference on Neural Networks [C ] . 2000 . 38 .
YANG Y H , HUANG H Z , SHEN Q N , et al . Research on intrusion detection based on incremental GHSOM [J ] . Chinese Journal of Computers , 2014 , 37 ( 5 ): 1216 - 1224 .
LI L L , MA D J , WANG C S , et al . New method for conflict evidence processing in DS theory [J ] . Application Research of Computers , 2011 , 28 ( 12 ): 4528 - 4531 .
DU Y W , SHI F Y , YANG N . Construction method for Bayesian network based on Dempster-Shafer/analytic hierarchy process [J ] . Journal of Computer Applications , 2015 , 35 ( 1 ): 140 - 146,151 .