• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
Citation: Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.

An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning

More Information
  • Published Date: July 14, 2006
  • It is an important research topic to improve detection rate and reduce false positive rate of the detection model in the field of intrusion detection. Based on the in-deep research on inductive learning theory, a rule learning algorithm is applied in building the intrusion detection model. For the case of detection precision's decline when lacking audit training data, an efficient approach to intrusion detection is proposed based on boosting rule learning (EAIDBRL). In EAIDBRL, firstly, weights of sample data in the traditional Boosting algorithm are adjusted separately within each class without changing overall class weights to eliminate deterioration in generation performance on some intrusion detection datasets; secondly, the evaluating criteria for rule growing and rule pruning of the traditional rule-learning algorithm are modified; and lastly this improved boosting algorithm is adopted to enhance generalization performance of weak rule learner on the network audit dataset. The results of experiments on the standard intrusion detection dataset indicate that EAIDBRL indeed can improve detection performance of the intrusion detection model built with the traditional rule learning algorithm.
  • Related Articles

    [1]Wu Hua, Wang Ling, Cheng Guang. Optimization of TCP Congestion Control Algorithm in Dynamic Adaptive Streaming over HTTP[J]. Journal of Computer Research and Development, 2019, 56(9): 1965-1976. DOI: 10.7544/issn1000-1239.2019.20180752
    [2]Huang Junjie, Chen Xiaojiang, Liu Chen, Fang Dingyi, Wang Wei, Yin Xiaoyan, Wu Yueshan. A Source Data Congestion Control Based on Sleep Schedule[J]. Journal of Computer Research and Development, 2015, 52(8): 1852-1861. DOI: 10.7544/issn1000-1239.2015.20140668
    [3]Gao Jianmin, Lu Huimei, Liu Jing, and Cao Yuanda. A Multi-Source ALM Congestion Control Method Based on Bi-Directional Pressure[J]. Journal of Computer Research and Development, 2012, 49(8): 1611-1617.
    [4]Dong Yongqiang, Yang Lu, and Dai Jiangpeng. Network Pricing Mechanism with Congestion Charge and Compensation[J]. Journal of Computer Research and Development, 2008, 45(8): 1322-1329.
    [5]Sun Limin, Li Bo, Zhou Xinyun. A Survey of Congestion Control Technology for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 63-72.
    [6]Li Shanshan, Liao Xiangke, Peng Shaoliang, Cheng Weifang, and Xiao Nong. A Practical Fairness Control Model in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 47-54.
    [7]Ju Hailing, Cui Li, Huang Changcheng. EasiCC:A Congestion Control Mechanism for WSN[J]. Journal of Computer Research and Development, 2008, 45(1): 16-25.
    [8]Li Shining, Guan Junming, Qin Zheng. KIR:A New Algorithm to Improve the Fairness of TCP Congestion Avoidance[J]. Journal of Computer Research and Development, 2006, 43(12): 2048-2055.
    [9]He Yanxiang, Xiong Naixue, Yang Yan. An Enhanced TCP Congestion Control Algorithm[J]. Journal of Computer Research and Development, 2005, 42(12): 2070-2076.
    [10]Ye Xiaoguo, Jiang Aiquan, and Wu Jiagao. ANLMCC—An Active Network-Based Layered Multicast Congestion Control Scheme[J]. Journal of Computer Research and Development, 2005, 42(2): 273-279.

Catalog

    Article views (902) PDF downloads (1202) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return