检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:蔡黎亚 田英杰[2] Cai Liya;Tian Yingjie(Suzhou Industrial Park Institute of Services Outsourcing,Suzhou 215123,Jiangsu,China;Key Laboratory of Big Data Mining and Knowledge Management,CAS Research Center on Fictitious Economy&Data Science,Chinese Academy of Sciences,Beijing 100190,China)
机构地区:[1]苏州工业园区服务外包职业学院,江苏苏州215123 [2]中国科学院大数据挖掘与知识管理重点实验室中国科学院虚拟经济与数据科学研究中心,北京100190
出 处:《计算机应用与软件》2024年第2期305-310,共6页Computer Applications and Software
基 金:国家自然科学基金重点项目(71731009)。
摘 要:针对物联网中多变性的入侵行为,在雾计算模式下提出一种基于深自编码器和扩展孤立森林相混合的入侵检测方法。使用一维卷积神经网络(1D-CNN)实现的自编码器对雾节点采集的网络流量数据进行入侵检测,并将攻击和正常流量数据分为两组;采用扩展孤立森林算法分别对深自编码器区分的攻击流量和正常流量进行异常检测,尝试识别攻击组和正常组中不匹配的数据点,从而提高所提方法的整体检测准确度和降低误报率。与其他入侵检测方法相比,所提方法在多个指标中取得最佳的结果,能够有效识别快速演化的网络攻击。Aimed at the variability of intrusion behavior in the Internet of things,a hybrid intrusion detection method based on deep autoencoder and extended isolated forest is proposed for fog computing mode.The autoencoder based on one-dimensional convolutional neural network(1D-CNN)was used to detect the network traffic data collected by fog nodes,and the attack and normal traffic data were divided into two groups.The extended isolated forest algorithm was used to detect the anomaly of attack traffic and normal traffic,and try to identify the mismatched data points in attack group and normal group,so as to improve the overall detection accuracy and reduce the false alarm rate of the proposed method.Compared with other intrusion detection methods,the proposed method achieves the best results among multiple indicators,and can effectively identify rapidly evolving network attacks.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.137.222.1