- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Network Intrusion Detection based on Dynamic Self-Organizing Map.doc
Network Intrusion Detection based on Dynamic Self-Organizing Map
Abstract: Self-organizing Map (SOM) is getting more attention in the intrusion detection. Considering current intrusion detection system with high false alarm rate and low detection rate, this paper introduces a simple modification to the SOM that eliminates learning rate, weight update and trust degree, and adds automatic clustering. The improved SOM (DSOM) is implemented and applied to the intrusion detection. The validities and feasibilities of the DSOM are confirmed through experiments on KDD Cup 99 dataset. The experimental result shows that the detection rate has been increased by employing the DSOM.
Key words: intrusion detection; neural networks; self-organizing map; learning rate.
1 Introduction
An intrusion can be defined as a series of activities aiming at compromising the security of a computer network system. Intrusions may take many forms: external attacks, internal misuses, network-based attacks, information gathering and denial of service, and so on. Intrusion detection is an important step of protecting the computer network system from intrusions. Intrusion detection systems (IDSs) are used to detect, identify and stop intruders. The administrators can rely on them to find out successful attacks and prevent a future use of known exploits. IDSs are also considered as a complementary solution to firewall technology by recognizing attacks against the network that are missed by the firewall.
Intrusion detection techniques can be mapped into four classes: anomaly detection, misuse detection, specification-based detection and model-based detection. Anomaly detection consists of establishing normal behavior profile for user and system activity and observing significant deviations of actual user activity with respect to the established habitual pattern. Misuse detection refers to intrusions that follow well defined attack patterns that exploit weaknesses in system and applic
您可能关注的文档
- A Review of Manufacturing Process of Contemporary Chinese Blue and White Creation.doc
- A Segmentation Method of Printed Mongolian Character Recognition.doc
- A study of New Media Design under the Cultural and Creative Industry.doc
- A Study of START Model in the Translation Training Workshop.doc
- A Study of the Impact of Signal Distortions on the Behavior of Internal Traders.doc
- A Study on Database Fuzzy Query Method in SQL.doc
- A Study on Ningxia’s Economic Development with Low Carbon.doc
- A Study on the Effectiveness of Vocational English Instructional Design.doc
- A Study on the Influences of Yao Ming’s Basketball Career on Chinese College Students’ Basketball .doc
- A Study on the Relationship of Technological Innovation Promoting Industrial Structure Upgrading.doc
- Network Resource Search System Applying Cluster Architecture.doc
- Novel top-down methods for Hierarchical Text Classification.doc
- Numerical simulation method for Surrounding rock stability analysis of surge chamber under seismic c.doc
- O2O模式与B2C模式比较研究.doc
- Object-oriented Program Tailoring Based on Model.doc
- Observation on Coordination of Heterogeneous Databases.doc
- Observation on Theory―practice Teaching Mode of of Taxation Practice in Higher Vocational Colleges.doc
- On Functions of Chinese Culture Knowledge in Teaching English in China.doc
- On How to Develop Students’ Innovation Ability in Physical Education Teaching.doc
- On Objects of Language Economics Study in China.doc
最近下载
- 2025-2026新人教版小学3三年级数学上册全册教案【新教材】.doc
- 发展社会主义民主政治..pptx VIP
- 加油站试用合同.docx VIP
- 《发展社会主义民族政治》主题单元设计.doc VIP
- 学校财务管理培训课件《中小学食堂财务管理与会计核算》.pptx VIP
- 广东省深圳市罗湖区2023年中考英语二模试卷(附答案详解).docx VIP
- 高压变频器节能计算.docx VIP
- 水利水电工程单元工程施工质量验收评定表及填表说明.doc VIP
- 《中国特色社会主义》教案第二单元第5课第2框教案.docx VIP
- 苏少版(2024)小学美术一年级上册教学设计(附教材目录).docx VIP
文档评论(0)