CN106778252A - 基于粗糙集理论与waode算法的入侵检测方法 - Google Patents
基于粗糙集理论与waode算法的入侵检测方法 Download PDFInfo
- Publication number
- CN106778252A CN106778252A CN201610641020.6A CN201610641020A CN106778252A CN 106778252 A CN106778252 A CN 106778252A CN 201610641020 A CN201610641020 A CN 201610641020A CN 106778252 A CN106778252 A CN 106778252A
- Authority
- CN
- China
- Prior art keywords
- attribute
- data
- training
- waode
- property
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Hardware Design (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Software Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610641020.6A CN106778252B (zh) | 2016-08-05 | 2016-08-05 | 基于粗糙集理论与waode算法的入侵检测方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610641020.6A CN106778252B (zh) | 2016-08-05 | 2016-08-05 | 基于粗糙集理论与waode算法的入侵检测方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106778252A true CN106778252A (zh) | 2017-05-31 |
CN106778252B CN106778252B (zh) | 2020-04-10 |
Family
ID=58972232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610641020.6A Active CN106778252B (zh) | 2016-08-05 | 2016-08-05 | 基于粗糙集理论与waode算法的入侵检测方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778252B (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110390423A (zh) * | 2019-06-14 | 2019-10-29 | 中国人民解放军战略支援部队航天工程大学 | 一种弹药需求量的预测方法及装置 |
CN111404665A (zh) * | 2020-03-10 | 2020-07-10 | 南京工业大学 | 一种基于cp-abe的密文访问控制方法 |
CN113010884A (zh) * | 2021-02-23 | 2021-06-22 | 重庆邮电大学 | 一种入侵检测系统中的实时特征过滤方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420723A (zh) * | 2011-12-14 | 2012-04-18 | 南京邮电大学 | 一种面向多类入侵的异常检测方法 |
CN102521534A (zh) * | 2011-12-03 | 2012-06-27 | 南京大学 | 一种基于粗糙熵属性约简的入侵检测方法 |
CN105117322A (zh) * | 2015-08-28 | 2015-12-02 | 国网浙江省电力公司 | 一种基于多源报警日志安全事件特征分析的去冗余方法 |
-
2016
- 2016-08-05 CN CN201610641020.6A patent/CN106778252B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521534A (zh) * | 2011-12-03 | 2012-06-27 | 南京大学 | 一种基于粗糙熵属性约简的入侵检测方法 |
CN102420723A (zh) * | 2011-12-14 | 2012-04-18 | 南京邮电大学 | 一种面向多类入侵的异常检测方法 |
CN105117322A (zh) * | 2015-08-28 | 2015-12-02 | 国网浙江省电力公司 | 一种基于多源报警日志安全事件特征分析的去冗余方法 |
Non-Patent Citations (3)
Title |
---|
罗俊: ""粗糙集理论约简算法及其应用研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
陈云平: ""基于属性约简的AODE入侵检测研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
齐福慧: ""基于关联规则的加权AODE模型的研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110390423A (zh) * | 2019-06-14 | 2019-10-29 | 中国人民解放军战略支援部队航天工程大学 | 一种弹药需求量的预测方法及装置 |
CN111404665A (zh) * | 2020-03-10 | 2020-07-10 | 南京工业大学 | 一种基于cp-abe的密文访问控制方法 |
CN113010884A (zh) * | 2021-02-23 | 2021-06-22 | 重庆邮电大学 | 一种入侵检测系统中的实时特征过滤方法 |
CN113010884B (zh) * | 2021-02-23 | 2022-08-26 | 重庆邮电大学 | 一种入侵检测系统中的实时特征过滤方法 |
Also Published As
Publication number | Publication date |
---|---|
CN106778252B (zh) | 2020-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuang et al. | Predicting duration of traffic accidents based on cost-sensitive Bayesian network and weighted K-nearest neighbor | |
Xu et al. | Uncovering collusive spammers in Chinese review websites | |
Han et al. | Intelligent decision model of road maintenance based on improved weight random forest algorithm | |
CN106503086A (zh) | 分布式局部离群点的检测方法 | |
CN107633030B (zh) | 基于数据模型的信用评估方法及装置 | |
CN107679734A (zh) | 一种用于无标签数据分类预测的方法和系统 | |
WO2019200739A1 (zh) | 数据欺诈识别方法、装置、计算机设备和存储介质 | |
CN108197636A (zh) | 一种基于深度多视点特征的稻谷检测和分类方法 | |
CN112700324A (zh) | 基于CatBoost与受限玻尔兹曼机结合的用户借贷违约预测方法 | |
CN109635010A (zh) | 一种用户特征及特征因子抽取、查询方法和系统 | |
CN106778252A (zh) | 基于粗糙集理论与waode算法的入侵检测方法 | |
VS | Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. | |
CN112001788A (zh) | 一种基于rf-dbscan算法的信用卡违约欺诈识别方法 | |
García-Vico et al. | Fepds: A proposal for the extraction of fuzzy emerging patterns in data streams | |
Rabbi et al. | An Approximation For Monitoring The Efficiency Of Cooperative Across Diverse Network Aspects | |
Prabhakaran et al. | Towards prediction of paradigm shifts from scientific literature | |
CN104537383A (zh) | 一种基于粒子群的海量组织机构数据分类方法及系统 | |
Sharma et al. | Construction of large-scale misinformation labeled datasets from social media discourse using label refinement | |
Zhang | Financial data anomaly detection method based on decision tree and random forest algorithm | |
CN113343123A (zh) | 一种生成对抗多关系图网络的训练方法和检测方法 | |
Pamuncak et al. | Deep learning for bridge load capacity estimation in post-disaster and-conflict zones | |
Ohanuba et al. | Topological data analysis via unsupervised machine learning for recognizing atmospheric river patterns on flood detection | |
CN115222196B (zh) | 一种山区道路网脆弱性评估与驱动力探测方法 | |
Li et al. | CRNN: Integrating classification rules into neural network | |
CN116562615A (zh) | 一种用于乳制品食品安全的风险预警方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Qianmu Inventor after: Geng Xiachen Inventor after: Li Deqiang Inventor before: Geng Xiachen Inventor before: Li Qianmu Inventor before: Li Deqiang |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20170531 Assignee: NANJING SINOVATIO TECHNOLOGY Co.,Ltd. Assignor: NANJING University OF SCIENCE AND TECHNOLOGY Contract record no.: X2022980008506 Denomination of invention: Intrusion detection method based on rough set theory and waode algorithm Granted publication date: 20200410 License type: Common License Record date: 20220622 |