首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网络攻击检测中的机器学习方法综述
引用本文:覃爱明,胡昌振,谭惠民.网络攻击检测中的机器学习方法综述[J].安全与环境学报,2001,1(1):30-36.
作者姓名:覃爱明  胡昌振  谭惠民
作者单位:北京理工大学机电工程学院,北京,100081
摘    要:在详细介绍网络攻击检测机器学习原理的基础上,对现有的各种方法进行了评述,并结合网络攻击检测系统的应用需求,阐述了网络攻击检测系统机器学习技术的发展方向。

关 键 词:网络攻击  检测系统  机器学习技术  网络信息系统  安全防护
文章编号:1009-6094(2001)01-0030-07
修稿时间:2000年9月9日

MACHINE LEARNING APPROACHES FOR NETWORK INTRUSION DETECTION: A SURVEY
QIN Ai-ming,HU Chang-zhen &TAN Hui-min.MACHINE LEARNING APPROACHES FOR NETWORK INTRUSION DETECTION: A SURVEY[J].Journal of Safety and Environment,2001,1(1):30-36.
Authors:QIN Ai-ming  HU Chang-zhen &TAN Hui-min
Abstract:With the developement of network technology and network connection scales, network security has already been an important research task. In this regard it is imperative to detect those unseen system attacks in an automated monitoring environment. As a new kind of network security technology, network intrusion detection seeks to detect attacks in an organization's security policy quite simply. However, existing intrusion detection systems rely heavily on human analysts to differentiate intrusive from non-intrusive network traffic. For such purpose machine learning techniques are used to provide decision aids for the analysts and automatically generate rules for computer network intrusion detection. Machine learning can be viewed as the attempt to build computer programs that improve performance of some task though learning and experience. This investigation goes back to the middle of 1990's. The present review gives a brief introduction to 6 kinds of machine learning approaches for network intrusion detection system, namely, Data Mining, Neural Networks, Genetic Algorithms, Decision Trees, Rough Sets and Immune System-Based Approach. Their principles and learning processes are presented in details. On the basis of the introduction , the respective advantages and disadvantages are commented. In the end, the developing directions of machine learning techniques are addressed according to the application requirements of network intrusion detection system.
Keywords:network security  intrusion detection  machine learning  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号