基于重采樣的級(jí)聯(lián)分類器入侵檢測(cè)研究
[Abstract]:With the rapid development of the information technology and the popularization of the network, the Internet has become an important part of people's work life, and meanwhile, the malicious information stealing, personal attack and illegal exploitation of the Internet in the Internet also increase, and the problem of network security is becoming more and more serious. The importance of network security research is becoming more and more prominent. Intrusion detection is a hot topic in the field of network security, and it is a process to detect the violation of safe use in computer network or system. With the development of information technology, the complexity of all kinds of computer systems also grows exponentially, which brings great difficulty to the intrusion detection. In this paper, through the research of the network intrusion detection method, it is found that the common intrusion detection method is mainly devoted to the improvement of the overall detection rate, but the detection rate of some important categories is ignored, such that the R2L (unauthorized access from the remote host) and the U2R (unauthorized local super-user privilege access) have a low detection rate, however, after the two types of behavior intrusion are successful, the server resources can be stolen or destroyed, It is very urgent to improve its detection performance. In this paper, the main causes of the two kinds of attack detection results of R2L and U2R are analyzed in this paper. The main cause of this paper is that the data distribution is not balanced, leading to the skew of the classification. It is an unbalanced classification problem (that is, the distribution of the training concentrated data is extremely unbalanced, the number of samples of one or some classes is far greater than or smaller than the other categories), and the other is that the two types of attacks are difficult to distinguish from the header, and the detailed content information of the data packet is required. Through the analysis and research of the common intrusion detection method, it is found that they all adopt the same method to detect various types, so it is difficult to achieve the ideal effect, and the cascade of multiple classifiers can effectively solve the problem of unbalanced data distribution in the intrusion detection. The intrusion detection is a typical non-equilibrium classification problem. In this paper, the non-equilibrium classification method such as re-sampling is deeply studied in this paper, and the method of NCL (neighborhood cleaning) filter is introduced to the problem of noise and boundary data in the process of re-sampling the intrusion detection data set by the SMOTE. An improved re-sampling method, SMOTE-NCL, is proposed to filter out the noise and boundary data. In this paper, the cascade classifier is used for intrusion detection due to the advantages of the cascade classifier method in solving the problem of unbalanced classification and the good effect in the intrusion detection. However, considering the influence of the feature dimension of the intrusion detection data set on the detection performance, this paper selects the feature subset for the cascaded classifier by introducing the improved optimized CGFR feature selection method. And then the CGFR and the SMOTE-NCL are applied to a cascade classifier, and on the basis of that, a cascade classifier intrusion detection model based on the re-sampling is proposed to solve the problem that the two types of attack detection effects of the R2L and U2R are not ideal in the prior intrusion detection method. according to the theoretical analysis experiment, the classification method in the cascade classifier selected by the invention is a decision tree algorithm (C4.5) and a Naive Bayes (NB) algorithm, and the first classifier of the model cascade is used for training a Do S (denial of service attack), Probe (port scan) and Normal (normal data), the second classifier is used to train three types of Normal, R2L and U2R; in the course of detection, the test set first enters the first classifier to be classified by the classifier as normal data into the second classifier, and finally can complete Do S, Probe, The classification of the Normal, R2L and U2R categories. In this paper, the classification results of the feature subsets selected by the feature selection method and the CGFR method on the cascade classifier are compared, and the results of the classification using the cascade classifier on the data set with different sampling rates of the original data set and the SMOTE and the SMOTE-NCL re-sampling are compared. Finally, the results of classification by using the SVM, KNN, NB, C4.5 and the cascade classifier method on the data set of the SMOTE-NCL re-sampling are compared, and the AUC values of the cascade classifier intrusion detection model based on CGFR and SMOTE-NCL are higher than that of other cases for both U2R and R2L attacks. However, the detection result of the R2L is still not ideal because the R2L class attack is difficult to distinguish by the packet header feature, and the detailed content characteristics of the data packet are required to determine that the large number of sample header features are not identical to Normal, so the detection effect is not ideal. To further solve this problem, the author considers that part of the feature should be extracted from the contents of the data packet when the data is extracted, and the training set and test set can be dynamically generated, which is also the work of the next step.
【學(xué)位授予單位】:西南大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 龔儉;臧小東;蘇琪;胡曉艷;徐杰;;網(wǎng)絡(luò)安全態(tài)勢(shì)感知綜述[J];軟件學(xué)報(bào);2017年04期
2 李威;楊忠明;;入侵檢測(cè)系統(tǒng)的研究綜述[J];吉林大學(xué)學(xué)報(bào)(信息科學(xué)版);2016年05期
3 袁開銀;費(fèi)嵐;;混合粒子群優(yōu)化算法選擇特征的網(wǎng)絡(luò)入侵檢測(cè)[J];吉林大學(xué)學(xué)報(bào)(理學(xué)版);2016年02期
4 江頡;王卓芳;陳鐵明;朱陳晨;陳波;;自適應(yīng)AP聚類算法及其在入侵檢測(cè)中的應(yīng)用[J];通信學(xué)報(bào);2015年11期
5 武小年;彭小金;楊宇洋;方X;;入侵檢測(cè)中基于SVM的兩級(jí)特征選擇方法[J];通信學(xué)報(bào);2015年04期
6 崔亞芬;解男男;;一種基于特征選擇的入侵檢測(cè)方法[J];吉林大學(xué)學(xué)報(bào)(理學(xué)版);2015年01期
7 楊雅輝;黃海珍;沈晴霓;吳中海;張英;;基于增量式GHSOM神經(jīng)網(wǎng)絡(luò)模型的入侵檢測(cè)研究[J];計(jì)算機(jī)學(xué)報(bào);2014年05期
8 肖仙謙;朱俊平;景旭;馬巧娥;;基于貝葉斯方法的單分類入侵檢測(cè)技術(shù)[J];河北大學(xué)學(xué)報(bào)(自然科學(xué)版);2014年01期
9 付忠良;;多標(biāo)簽代價(jià)敏感分類集成學(xué)習(xí)算法[J];自動(dòng)化學(xué)報(bào);2014年06期
10 張玲;白中英;羅守山;謝康;崔冠寧;孫茂華;;基于粗糙集和人工免疫的集成入侵檢測(cè)模型[J];通信學(xué)報(bào);2013年09期
相關(guān)博士學(xué)位論文 前1條
1 劉運(yùn);DDoS Flooding攻擊檢測(cè)技術(shù)研究[D];國防科學(xué)技術(shù)大學(xué);2011年
相關(guān)碩士學(xué)位論文 前3條
1 劉敏捷;基于組合學(xué)習(xí)和主動(dòng)學(xué)習(xí)的蛋白質(zhì)關(guān)系抽取[D];大連理工大學(xué);2015年
2 張楠;數(shù)據(jù)挖掘在入侵檢測(cè)中的應(yīng)用研究[D];電子科技大學(xué);2015年
3 陳明旺;面向不平衡數(shù)據(jù)的支持向量機(jī)方法在入侵檢測(cè)中的應(yīng)用與研究[D];南京大學(xué);2011年
,本文編號(hào):2438217
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2438217.html