通信学报 ›› 2015, Vol. 36 ›› Issue (Z1): 60-64.doi: 10.11959/j.issn.1000-436x.2015282

• 学术论文 • 上一篇    下一篇

基于Dempster-Shafer理论的GHSOM入侵检测方法

苏洁,董伟伟,许璇,刘帅,谢立鹏   

  1. 哈尔滨理工大学 计算机科学与技术学院,黑龙江 哈尔滨 150080
  • 出版日期:2015-11-25 发布日期:2015-12-29
  • 基金资助:
    黑龙江省自然科学基金资助项目;黑龙江省教育科学规划课题基金资助项目;黑龙江省普通高等学校新世纪优秀人才培养计划基金资助项目;黑龙江省博士后基金资助项目;黑龙江省教育厅科学面上研究基金资助项目

GHSOM intrusion detection based on Dempster-Shafer theory

Jie SU,Wei-wei DONG,Xuan XU,Shuai LIU,Li-peng XIE   

  1. School of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China
  • Online:2015-11-25 Published:2015-12-29
  • Supported by:
    The Natural Science Foundation of Heilongjiang Province;Scientific Planning Issues of Education in Heilongjiang Province;Research Fund for the Program of New Century Excellent Talents in Heilongjiang Provincial University;Post Doctoral Fund of Heilongjiang

摘要:

结合证据推理DS理论,提出了基于Dempster-Shafer理论的GHSOM神经网络入侵检测方法,一方面处理数据不确定性中的随机性和模糊性问题,可以在噪音环境下保持良好的检测率,此外通过证据融合理论缩小数据集,有效控制网络的动态增长。实验结果表明,基于 Dempster-Shafer 理论的 GHSOM 入侵检测方法实现了对子网拓展规模在检测中的动态控制,提升了在网络规模不断扩展时的动态适应性,在噪音环境下具有良好的检测准确率,提升了GHSOM入侵检测方法的扩展性。

关键词: Dempster-Shafer理论, 增量式GHSOM神经网络, 入侵检测, 网络安全

Abstract:

On the basis of incremental GHSOM,the GHSOM neural network intrusion detection based on the theory of evidence reasoning method was put forward.It can deal with the uncertainty caused by randomness and fuzziness,as well as can constantly narrowing assumptions set by accumulate the evidence,effectively control dynamic growth of network and keep a good accuracy in noise environment.Experiments show that GHSOM intrusion detection method based on the Dempster Shafer theory realized the dynamic control for the scale of expended subnet during the process of detection.It has the better detection accuracy in the noise environment and improves the adaptability and extensibility of incremental GHSOM neural network intrusion detection method when the scale of network is expanded.

Key words: Dempster-Shafer theory, incremental GHSOM neural networks, intrusion detection, network security

No Suggested Reading articles found!