• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gu Yu, Xu Zongben, Sun Jian, Zheng Jinhui. An Intrusion Detection Ensemble System Based on the Features Extracted by PCA and ICA[J]. Journal of Computer Research and Development, 2006, 43(4): 633-638.
Citation: Gu Yu, Xu Zongben, Sun Jian, Zheng Jinhui. An Intrusion Detection Ensemble System Based on the Features Extracted by PCA and ICA[J]. Journal of Computer Research and Development, 2006, 43(4): 633-638.

An Intrusion Detection Ensemble System Based on the Features Extracted by PCA and ICA

More Information
  • Published Date: April 14, 2006
  • Intrusion detection system should be able to detect intrusion behaviors and learn novel intrusion types. In this paper, an intrusion detection ensemble system is proposed, which is integrated by two incremental SVM (support vector machine) subsystems. The two subsystems process the features extracted by PCA and ICA respectively. The intrusion information is represented by support vectors set and the weight of the integration is adjusted by genetic algorithm. Experiments show that the ensemble system combines the advantages of the two subsystems, and outperforms each of the subsystems and the standard SVM system.
  • Related Articles

    [1]Li Junwei, Liu Quan, Huang Zhigang, Xu Yapeng. A Diversity-Enriched Option-Critic Algorithm with Interest Functions[J]. Journal of Computer Research and Development, 2024, 61(12): 3108-3120. DOI: 10.7544/issn1000-1239.202220970
    [2]Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng. Optimization of Library Function Disposing in Dynamic Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791. DOI: 10.7544/issn1000-1239.2019.20170871
    [3]Huang Yicai, Zhou Weiwei, Yu Bin. Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function[J]. Journal of Computer Research and Development, 2018, 55(11): 2467-2481. DOI: 10.7544/issn1000-1239.2018.20170305
    [4]Zhou Yuhang, Zhou Zhihua. Cost-Sensitive Large Margin Distribution Machine[J]. Journal of Computer Research and Development, 2016, 53(9): 1964-1970. DOI: 10.7544/issn1000-1239.2016.20150436
    [5]Liu Yue, Li Jintao, Hu Songlin. A Cost-Based Splitting Policy Search Algorithm for Hive Multi-Dimensional Index[J]. Journal of Computer Research and Development, 2016, 53(4): 798-810. DOI: 10.7544/issn1000-1239.2016.20151163
    [6]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [7]Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, Liao Zhen. Cost-Sensitive Listwise Ranking Approach[J]. Journal of Computer Research and Development, 2012, 49(8): 1738-1746.
    [8]Zhou Ling, Wang Jianxin. Path Nodes-Driven Least-Cost Shortest Path Tree Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 721-728.
    [9]Qi Yutao, Liu Fang, and Jiao Licheng. A Pheromone Meme Based Immune Clonal Selection Algorithm for Function Optimization[J]. Journal of Computer Research and Development, 2008, 45(6).
    [10]Li Tao and Yang Yulu. Algorithms of Reconfigurable Resource Management and Hardware Task Placement[J]. Journal of Computer Research and Development, 2008, 45(2): 375-382.

Catalog

    Article views (720) PDF downloads (714) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return