用户名: 密码: 验证码:
数据挖掘技术在入侵检测系统中的应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数据挖掘(Data Mining)技术是从已知数据集中挖掘有用知识的技术。近十年来的有关研究结果表明,将数据挖掘技术应用于入侵检测系统(Intrusion Detection System,IDS),对有效地进行特征选择,建立合适的检测模型,最终提高入侵检测系统的入侵检测能力,降低其误报率和漏报率有着十分重要的意义。
     虽然将数据挖掘技术应用于IDS时可借鉴的算法较多,但由于能适合所有情形的数据挖掘算法是不存在的,所以算法研究方面至今尚无权威性的成果;同时,很多研究过于注重理论性与技术性,忽略了所引入的数据挖掘算法的复杂度对入侵检测系统效率的影响;此外,目前成熟的IDS产品基本都采用基于规则的检测方法,这类IDS将数据包与规则库的规则进行精确匹配,如果攻击模式很常见或过于特殊,就容易产生误报或漏报,从而降低入侵检测的准确率。
     为此,本文以江苏省教育厅的研究项目“基于数据挖掘的入侵检测技术的研究”(02SJD520002)为背景,以适应IDS数据源特点、降低复杂度、提高效率为目标,对数据挖掘算法进行研究,包括特征选择算法、数值归约算法、聚类算法;也以增强灵活性、降低误报率和漏报率为目标,对基于数据挖掘的入侵检测方法进行研究。
     论文针对入侵检测系统中被检测数据的特点,提出了一种适用于IDS的多次模糊迭代特征选择算法和一种适用于IDS的基于相关性度量的特征选择算法。多次模糊迭代特征选择算法由在属性空间中搜索特征子集、评估每个候选特征子集和分类这三个步骤组成,有与之相应的搜索算法和评估函数;该算法通过多次迭代去除特征值集的冗余特征得到精确度较高的特征值集,使用模糊逻辑得到与精确度要求相应的取值范围;由于单纯对数据进行操作,该算法能更客观地分析数据;论文还基于KDD Cup 99数据集对该算法进行了仿真分析;并将实验结果与特征可视化结果进行了比较;实验结果表明该算法在IDS数据集上可取得良好的特征选择效果。基于相关性度量的特征选择算法对特征值进行模糊处理,计算特征相关性度量值,按度量值降序排列特征,再基于该特征序列进行特征选择;以分类器作为评估系统,以KDD Cup 99为数据源的仿真结果验证了该算法能在不影响效率的同时降低时间复杂度。
     论文还以提高IDS中分类挖掘的效率为目标,提出了一种适用于IDS中数据分类的数值归约算法,该算法一方面用值域来减少特征值数目,一方面将孤立的点放大为一个区域以预测类似行为;以KDD Cup 99数据集为数据源、以决策树分类算法为例的仿真实验结果表明,该算法能在降低已有分类算法的时间复杂度的同时使分类准确率有所提升。
     聚类分析常被用于IDS的入侵检测阶段。本文针对经典模糊C-均值算法FCM的缺陷,提出了一种基于层次聚类的模糊聚类算法HFC,该算法采用凝聚的层次聚类方法,快速地发现高度聚集的数据区域,并对这些高密度区域进一步分析与合并,通过评估函数的评估,找到最优的聚类方案;仿真实验结果表明,该算法具有较高的聚类精确度和较强的排除噪声的能力;论文还通过基于KDD Cup 99数据集的仿真实验,分析了该算法对IDS中入侵检测的适用性。
     为了提高基于规则的IDS的检测能力,论文提出了基于CBR (Case-Based Reasoning,基于案例的推理)的入侵检测方法;描述了实现CBR的步骤;给出了由规则设计和构造案例库的启发式方法;设计了适用于IDS的CBR引擎及案例匹配算法;分别通过基于Snort的规则集、自行开发的攻击平台及离线检测系统的实验和基于在线数据包的实验,验证了CBR对基于规则的IDS检测能力的增强作用。
     最后,总结了所做的工作,分析了存在的不足,提出了进一步研究的目标。
     论文对数据挖掘技术在入侵检测系统中的应用做了有益的研究。
Data mining is a technique to mine the useful knowledge from the existing data set. In recent ten years, related research results have testified that it is very important to apply data mining technique to intrusion detection system (IDS) for effectively selecting features, properly building detection model as well as improving detection efficiency and decreasing both the false positive rate and the negative rate.
     When applying data mining technique to IDS, there are many algorithms to choose, but no algorithm can adapt to all circumstances, so there are still no authoritative results in algorithm research. Meanwhile, many researches lay particular stress on theory and technical aspects, and neglect the influence of algorithm complexity on the detection efficiency. In addition, most of the mature IDS products adopt the detection method based on rules to make the exact match between the packet and rule. If rules are too common or special, there will be many false or missing reports. That will reduce the accuracy of intrusion detection.
     Therefore, based on the research project“Research on the Intrusion Detection Technology Based on Data Mining”(02SJD520002) sponsored by the Education Bureau of Jiangsu Province, this dissertation makes researches on the algorithms adapting to IDS such as feature selection algorithm, numerosity reduction algorithm, and clustering algorithm with the targets of meeting the characteristics of the data source in IDS, reducing the complexity of algorithm and improving the efficiency. It also makes researches on the intrusion detection method based on data mining techniques with the target of enhancing the flexibility and reducing both the false positive rate and the negative rate.
     Based on the characteristics of the detected data in IDS, a Multi-time Fuzzy Iterating Feature Selection Algorithm adapting to IDS and a Correlation Measure-Based Feature Selection Algorithm for IDS are proposed in this dissertation. Multi-time Fuzzy Iterating Feature Selection Algorithm includes three steps, one is searching feature subsets from feature space, the other is valuating every candidate feature subset, and the last is classification. Corresponding search algorithm and valuation function are designed in this algorithm. The algorithm eliminates redundant features through multi-time iterating to get high precision feature value set, and uses fuzzy logic to get the value range meeting the need of precision. This algorithm can analyze data more objectively than the algorithms with field knowledge because it only operates on datasets. Simulation experiment and analysis are performed on the algorithm based on the KDD Cup 99 data set, and the experiment results are compared with feature visualization results. The results indicate: this algorithm can get good feature selection effect on IDS datasets. The Correlation Measure-Based Feature Selection Algorithm carries fuzzy process to feature value, calculates the degree of feature correlation, arranges features with descending order of the degree, then carry on feature selection based on the obtained feature sequence. The validity of this designed algorithm has been verified by doing experiments on the assessment system based on classifier and the dataset from the KDD Cup 99.
     In order to improve the mining efficiency of data classification in IDS, this dissertation also proposes a Numerosity Reduction Algorithm Adapting to the Data Classification in IDS, which uses range of values to reduce the amount of feature values and expands an isolated point to a region in order to forecast similar behavior. The results of experiments with decision tree algorithms and the KDD Cup 99 dataset have shown that this algorithm can reduce the time complexity and increase the classifying accuracy of the existing classification algorithms.
     Clustering is widely used in intrusion detection phase. In this dissertation, a hierarchical fuzzy clustering (HFC) algorithm is put forward to overcome the limitation of classical fuzzy C-means (FCM) algorithm. HFC can fast discover the high concentrated data areas by the agglomerative hierarchical clustering method, analyze and merge the data areas, and then use the evaluation function to find the optimum clustering scheme. The experimental results indicate that HFC has higher clustering precision and higher ability of excluding noises. The applicability of HFC algorithm to IDS is analyzed by doing experiments on KDD99 dataset.
     In order to improve the detection ability of rule-based IDS, this dissertation puts forward an Intrusion Detection Method based on CBR (Case-Based Reasoning). The steps of implementing CBR are described, several illuminative methods for designing and constructing case base from rules are proposed, and a CBR engine as well as the case matching algorithms is designed. Finally, the experiment based on Snort rule sets, the attack platform, the offline detection system, and the experiment based on online packets are performed which verify the effect of CBR for enhancing the detection ability of rule-based IDS.
     Finally, the works are summarized, the shortages are analyzed, and the targets of further research are given.
     This dissertation has done useful researches on the applications of Data Mining Technique in Intrusion Detection System.
引文
[1] Dorothy Denning E. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987,13 (2), pp. 222-232
    [2] Lunt T.F, Tamaru A, Gilham F. IDES: a progress report [Intrusion-Detection Expert System][C]. Proceedings of the Sixth Annual on Computer Security Applications Conference, 1990, pp.273-285
    [3]叶丹.网络安全实用技术[M].北京:清华大学出版社, 2002
    [4]韩东海,王超,李群.入侵检测系统实例剖析[M].北京:清华大学出版社,2004
    [5]张旻.数据挖掘中的若干新方法及其应用研究[D].合肥:安徽大学, 2004
    [6] P. Adriaans and D. Zantinge. Data Mining[M]. Addison-Wesley: H arlow, England, 1996.
    [7]邵峰晶,于忠清.数据挖掘原理与算法[M].北京:中国水利水电出版社, 2003
    [8] Jiawei Han, MichelineKamber: Data mining: Concepts and Techniques[M]. San Francisco: Morgan Kaufmann Publishers, Inc, 2001
    [9] Fayyad U M, Piatesky-Shapiro G, Smyth P. From data mining to knowledge discovery: An overview. In advances in knowledge discovery and data mining [M]. AAAI Press and the MIT Press, 1996
    [10] Mehmed Kantardzic, Data Mining Concepts, Models, Methods, and Algorithms[M]. IEEE Press, 2002
    [11] Wenke Lee, Stolfo S.J, Mok K.W. A data mining framework for building intrusion detection models[C]. Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, pp.120-132
    [12] Wenke Lee, Stolfo, S.J, Chan, P.K. et al. Real time data mining-based intrusion detection[C]. Proceedings of DARPA Information Survivability Conference & Exposition II, 2001, pp.89-100, 2001
    [13] Jun-Zhong Zhao,Hou-Kuan Huang. An intrusion detection system based on data mining and immune principles[C]. Proceedings of International Conference on Machine Learning and Cybernetics, 2002, pp.524-528
    [14] Fang-Yie Leu,Tzu-Yi Yang. A host-based real-time intrusion detection system with data mining and forensic techniques[C]. Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, 2003, pp.580-586
    [15] Junzhong Zhao,Maozhi Xu,Shanli Sun, et al. A model of evolving intrusion detection system based on data mining and immune principle[C]. Proceedings of IEEE Region 10 Conference on TENCON, 2004, pp.199-202
    [16] Zhi-Xin Yu,Jing-Ran Chen,Tian-Qing Zhu. A novel adaptive intrusion detection system based on data mining[C]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, 2005, pp.2390-2395
    [17] Weidong Li,Kejun Zhang,Boqun Li, et al. An efficient framework for intrusion detection based on data mining[C]. Proceedings of Congress on Computational Intelligence Methods and Applications, 2005, pp.4
    [18]范秉琪,朱晓东,马鸿雁等.基于数据挖掘的网络入侵检测系统的设计与应用[J].河南理工大学学报(自然科学版),2006, 25(3): 247-250
    [19]景凤宣,连红.基于Mobile Agent数据挖掘技术的入侵检测系统[J].贵州师范大学学报(自然科学版),2006, 24(2): 92-94
    [20]范哲.基于数据挖掘的分布式入侵检测系统模型的设计[J].电脑知识与技术,2006, No.5: 4-5
    [21]任铮,陈志刚.基于数据挖掘和规划的智能网络入侵检测系统[J].计算机工程与科学, 2006, 28(3): 5-7
    [22]王保平.基于数据挖掘的多Agent入侵检测系统研究[J],南阳师范学院学报, 2006, 5(3): 80-83
    [23]伊胜伟,刘旸,魏红芳.基于数据挖掘的入侵检测系统智能结构模型[J],计算机工程与设计, 2005, 26(9): 2464-2466
    [24] Hai Jin, Jianhua Sun, Hao Chen, et al. A fuzzy data mining based intrusion detection model[C]. Proceedings of 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004, pp.191-197
    [25] Hossain M, Bridges S.M. Adaptive intrusion detection with data mining[C]. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 2003, pp.3097-3103,
    [26] Hong Han, Xin-Liang Lu, Li-Yong Ren. Using data mining to discover signatures innetwork-based intrusion detection[C]. Proceedings of 2002 International Conference on Machine Learning and Cybernetics, 2002, pp.13-17
    [27] Sengupta S, Andriamanalimanana B, Card S.W, et al. Towards data mining temporal patterns for anomaly intrusion detection systems[C]. Proceedings of the Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2003, pp. 205- 209
    [28] El-Semary A, Edmonds J, Gonzalez-Pino J, et al. Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection[C]. Proceedings of 2006 IEEE Information Assurance Workshop, 2006, pp.100-107
    [29]王艳芳,张连华,白英彩.基于粗糙集数据挖掘和分类集成学习的网络入侵检测模型[J].计算机应用与软件, 2006, 23(4): 120-122
    [30]利业鞑,孙伟.基于数据挖掘的入侵检测精确度提升方法[J].北方工业大学学报, 2006, 18(1): 1-5
    [31]陈慧萍,王建东,叶飞跃等.基于模糊数据挖掘的网络入侵检测模型[J].南京航空航天大学学报(英文版),2005, 22(3): 247-251
    [32]邓海文,艾虹虹,李斌.基于Bays网络数据挖掘的入侵检测模型的探讨[J].科技广场, 2005, No.6, 30-33
    [33]吕锡香,杨波,裴昌幸等.基于数据挖掘的入侵检测系统检测引擎的设计[J].西安电子科技大学学报(自然科学版),2004, 31(4): 574-580
    [34]倪霖,郑洪英.基于聚类和支持向量机的入侵检测研究[J].计算机应用, 2007, 27(10): 2440-2452
    [35]唐少先,蔡文君.基于无监督聚类混合遗传算法的入侵检测方法[J].计算机应用, 2008, 28(2): 409-411
    [36] Guowei Wu, Lin Yao, Kai Yao. An Adaptive Clustering Algorithm for Intrusion Detection[C]. Proceedings of 2006 IEEE International Conference on Information Acquisition, 2006, pp.1443-1447
    [37] Hooper, E. An Intelligent Intrusion Detection and Response System Using Hybrid Ward Hierarchical Clustering Analysis[C]. Proceedings of International Conference on Multimedia and Ubiquitous Engineering, 2007, pp.1187-1192
    [38] Weng Fangfei, Jiang Qingshan, Shi Liang, et al. An Intrusion Detection System Based on the Clustering Ensemble[C]. Proceedings of 2007 IEEE International Workshop onAnti-counterfeiting, Security, Identification, 2007, pp. 121-124
    [39] Yong Zhong, Xiao-Lin Qin, Dong-Mei Lin. An Intrusion Detection Method Based on Clustering Multidimensional Sets[C]. Proceedings of 2006 International Conference on Machine Learning and Cybernetics, 2006, pp. 2799-2804
    [40] Ma Li, Bai Lin, Jiao Li-cheng, et al. Intrusion Detection Based on Adaptive Polyclonal Clustering[C]. Proceedings of 2006 International Conference on Computational Intelligence and Security, 2006, pp. 598-603
    [41] Chimphlee W, Abdullah A.H, Noor Md Sap M, et al. Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering[C]. Proceedings of International Conference on Hybrid Information Technology, 2006, pp. 329-334
    [42]杨晓强.一种进化半监督式模糊聚类的入侵检测算法[J].计算机工程与应用, 2008, 44(4): 33-35
    [43]彭佳红,沈岳,张林峰.数据挖掘中的特征选择及其算法研究[J].计算机工程与设计, 2005, 26(5): 1176-1178
    [44]陈友,程学旗,李洋,戴磊.基于特征选择的轻量级入侵检测系统[J].软件学报, 2007, 18(7): 1639-1651
    [45] Chou Te-Shun, Yen Kang K, Luo Jun, et al. Correlation-Based Feature Selection for Intrusion Detection Design[C]. Proceedings of IEEE MILCOM, 2007, pp. 1-7
    [46] Zainal Anazida, Maarof Mohd Aizaini, Shamsuddin Siti Mariyam. Feature Selection Using Rough Set in Intrusion Detection[C]. Proceedings of 2006 IEEE Region 10 Conference on TENCON, 2006, pp. 1-4
    [47] Wei Hu, Jianhua Li, Jianjun Shi. Optimal Evaluation of Feature Selection in Intrusion Detection Modeling[C]. Proceedings of The Sixth World Congress on Intelligent Control and Automation, 2006, pp. 5919-5922
    [48] Wai-Tak Wong, Cheng-Yang Lai. Identifying Important Features for Intrusion Detection using Discriminant Analysis and Support Vector Machine[C]. Proceedings of 2006 International Conference on Machine Learning and Cybernetics, 2006, pp. 3563-3567
    [49]罗皓.属性抽取在基于数据挖掘的入侵检测系统中的应用[D].西安交通大学, 2003
    [50] Hofmann A, Horeis T, Sick B. Feature Selection for Intrusion Detection: An Evolutionary Wrapper Approach[C]. Proceedings of 2004 IEEE International JointConference on Neural Networks, 2004, pp.1563-1568
    [51] Fadaeieslam, M. J.; Minaei-Bidgoli, B.; Fathy, M.; Soryani, M. Comparison of Two Feature Selection Methods in Intrusion Detection Systems[C]. Proceedings of 7th IEEE International Conference on Computer and Information Technology, 2007, pp. 83-86
    [52]陈晓梅.入侵检测中的数据预处理问题研究[J].计算机科学, 2006, 33(1):81-83
    [53]夏克文,沈钧毅等.样本信息处理中一种属性约简方法的研究[J].西安交通大学学报, 2005, 39(6): 558-561
    [54]刘山.属性约简中核的计算方法[J].计算机工程与应用. 2004, No.17: 100-101
    [55]邹涛.智能网络入侵检测系统关键技术研究[D].长沙:国防科学技术大学,2004
    [56]蔡庆生.数据挖掘和数据仓库在入侵检测中的应用研究[D].合肥:中国科学技术大学, 2003
    [57]刘雪飞.数据挖掘技术在入侵检测中的应用研究[D].南京:南京理工大学, 2005
    [58]熊家军.基于数据挖掘的入侵检测关键技术研究[D].武汉:华中科技大学, 2004
    [59]向继东.基于数据挖掘的自适应入侵检测建模研究[D].武汉:武汉大学, 2004
    [60]齐建东.基于数据挖掘的入侵检测方法及系统研究[D].北京:中国农业大学, 2003
    [61]杨向荣.入侵检测系统中数据挖掘和人工免疫原理的研究[D].西安:西安交通大学, 2003
    [62]刘勇国.基于数据挖掘的网络入侵检测研究[D].重庆:重庆大学, 2003
    [63]戴成强,彭宏. CBR技术在网络入侵检测系统中的应用[J].计算机工程与设计, 2007, 28(8): 1795-1797
    [64]李霞,张田文,李丽等.决策树特征基因选择方法对SVM有效性的研究[J].中国生物医学工程学报. 2004, 23(1): 66-72
    [65] Kononenko I. Estimating attributes: Analysis and extension of RELIEF[C]. Proceedings of the European Conference on Machine Learning, 1994, pp.171-182
    [66] Chambless B, Scarborough D. Information-theoretic feature selection for a neural behavioral model[C]. Proceedings of IJCNN’01, 2001, pp. 15-19
    [67] Kwak N, Chong-Ho Choi. Input feature selection for classification problems[J]. IEEE Transactions on Neural Networks, 2002, pp. 143-159
    [68] Castellano G., Fanelli A.M. Feature selection: a neural approach[C]. Proceedings of IJCNN '99, 1999, pp.3156-3160
    [69] Mitra P, Murthy C.A, Pal S.K. Unsupervised feature selection using feature similarity[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, pp.301-312
    [70] Fung G.S.K, Liu J.N.K, Chan K.H, et al. Fuzzy genetic algorithm approach to feature selection problem[C]. Proceedings of the Sixth IEEE International Conference on Fuzzy Systems, 1997, pp.441-446
    [71] Zhang M,Yao J. T. A Rough Sets Based Approach to Feature Selection[C]. Processing NAFIPS '04 of IEEE Annual Meeting of the Fuzzy Information, 2004, pp.434-439
    [72] Kumar M, Duffy C.J, Reed P.M. Enhancing the Performance of Feature Selection Algorithms for Classifying Hyperspectral Imagery[C]. Proceedings of IGARSS '04, 2004, pp.3264-3267
    [73] Guodong Guo, Dyer C.R. Learning From Examples in the Small Sample Case: Face Expression Recognition[J]. IEEE Transactions on Systems, Man, and Cybernetics, 2005, pp.477-488
    [74]郭文忠,陈国龙,陈庆良等.基于粒子群优化算法和相关性分析的特征子集选择[J].计算机科学, 2008, 35(2): 144-146
    [75]戴东亚.一种基于粗糙集的混合特征选择算法[J].华南理工大学学报, 2005, 27 (11): 57-58
    [76] The Information Systems Technology Group (IST) of MIT Lincoln Laboratory. 1999 DARPA Intrusion Detection Evaluation Data Sets. http://www.ll.mit.edu/SST/ideral/
    [77] J.R.Quinlan. Induction of Decision Trees[J]. Machine Leaming, 1986, No.1, pp. 81-106.
    [78] J.R.Quinlan. C4.5: Programs for Machine Learning[M]. San Francisco: Morgan Kaufmann, 1993.
    [79] Huang Z. Extensions to the K-means Algorithm for Clustering Large Data Sets with Categorical Values[J]. Data Mining and Knowledge Discovery, 1998, No.2, pp.283-304.
    [80] L.Kaufman, P.J.Rousseeuw. Finding Groups in Data: an Introduction to Cluster Analysis[M]. John Wiley & Sons, 1990.
    [81] R.NG, J.Han. Efficient and Effective Clustering Method for Spatial Data Mining[C]. Proc. 1994 Int. Conf. Very Large Data Bases, 1994: 144-155.
    [82] T.Zhang, R. Ramakrishnan, M. Livny. An Efficient Data Clustering Method for Very Large Databases[C]. Proc, 1996 ACM-SIGMOD Int. Conf. Management of Data. Montreal, Canada, June 1996, pp.103-114.
    [83] S.Guha, R.Rastogi and K. Shim. An Efficient Clustering Algorithm for Large Databases[C]. Proc. 1998 ACMSIGMOD Int. Conf. Management of Data. Seattle, USA, June 1998, pp.73-84.
    [84] M.Ester, H.P.Kriegel, J.Sander, et al. A Density-based Algorithm for Discovering Clusters in Large Spatial Databases[C]. Proc. 1996 Int. Conf. Knowledge Discovery and Data Mining. Portland, USA, Aug 1996, pp. 226-231.
    [85] M.Ankerst, M.Breunig, H.P.Kriegel, et al. OPTICS: Ordering Points to Identify the Clustering Structure[C]. In Proc.1999 ACM-SIGMOD Int. Conf. Management of Data(SIGMOD’99), Philadelphia, PA, 1999, pp.49-60
    [86] A.Hinneburg, D.A.Keim. An Efficient Approach to Clustering in Large Multimedia Databases with Noise[C]. Proc. 1998 Int. Conf. Knowledge Discovery and Data Mining(KDD’98), 1998: 58-65.
    [87] J.Wang, R.Yang, Muntz. A Statistical Information Grid Approach to Spatial Data Mining[C]. Proc. 1997 Int. Conf. Very Large Data Bases(VLDB’97), 1997, pp.186-195.
    [88] R.Agrawal, J.Gehrke, D.Gunopulos, et al. Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications[C]. In Proc. 1998 ACM-SIGMOD Int. Conf. Management of Data(SIGMOD’98), Seattle, WA, June 1998, pp.94-105,
    [89] D.Fisher. Improving Inference Through Conceptual Clustering[C]. In Proc. 1987 AAAI Conf., pages 461-465, Seattle, WA, July 1987.
    [90] Rumelhart D E. Zipser D. Feature Discovery by Competitive Learning[J]. Cognitive Science, 1985, No.9, pp.75-112.
    [91]李戈,邵峰晶,朱本浩.基于神经网络聚类的研究[J].青岛大学学报, 2001, 16(4): 21-24
    [92] X.L.Xie, G. Beni. A Validity Measure for Fuzzy C-Means Clustering [J]. IEEE Trans on Pattern Analysis and Machine Intelligence. 1991, 13(8), pp.841-847
    [93] Bezdek J C. Pattern Recognition with Fuzzy Objective Function Algorithms[M]. NewYork: Plenum Press, 1981: 95-107.
    [94]王万森.人工智能原理及其应用[M].北京:电子工业出版社, 2000.
    [95]Althoff, K.Web, S. Case-based reasoning and expert system development[J]. Contemporary Knowledge engineering and cognition.1st jnt.workshop, 1991:146-158.
    [96]陈文伟,黄金才.数据仓库与数据挖掘[M].北京:人民邮电出版社, 2004
    [97]郭艳红,邓贵仕.基于事例的推理(CBR)研究综述[J].计算机工程与应用, 2004, 40(21): 1-5
    [98]刘芳,姚莉等.基于语义Web的案例表示和CBR系统结构研究[J].计算机应用, 2004, 24(1): 17-19
    [99]Brian Caswell, Jay Beale, James C.Foster, Jeffrey Posluns. Snort 2.0 Intrusion Detection[M].北京:国防工业出版社, 2004.
    [100]陈楚珣,王英林,张申生.基于关系数据库的实例模板灵活性研究[J].计算机工程, 2000, 26(2): 42-44
    [101]Coyle L, Cunningham P, Hayes C. Representing Cases for CBR in XML[C]. In Proceedings of 7th UKCBR Workshop. Peterhouse, Cambridge, UK: Springer Verlag, 2002, pp.212-220
    [102]Hayes C, Cunningham P. Shaping a CBR View with XML[C]. Proceeding of the Third International Conference on Case-Based Reasoning, 1999, pp. 468-481
    [103]黄浩,施泽生,蔡洪滨.基于CBR系统事例检索算法的研究[J].计算机应用, 2003, 23(6): 13-16
    [104]钟波,肖智等.组合预测中基于粗糙集理论的权值确定方法[J].重庆大学学报, 2002, 25(7): 127-130
    [105]吴良刚,高阳,张金隆.确定事例特征权值的方法研究[J].系统工程理论与实践, 2000, 20(10): 89-92.
    [106]丰伟,杨学堂.基于熵权和改进AHP法的模糊优选方法[J].三峡大学学报, 2004, 26(6): 481-486.
    [107]杜晓明,于永利.基于案例推理的多准则综合评价[J].系统工程理论与实践, 1999, 19(2): 50-53.
    [108]WETZEL.B. Implementing A Search Engine With Case Based Reasoning[ EB /OL ].[ 2002-09-07]. http: / / ihatebaylor. com /technical/ computer/ ai / selection_engine /CBR.
    [109]李玲娟,王汝传.一种基于数据挖掘的入侵检测系统模型[J].南京邮电学院学报, 2005, 25(5): 40-43
    [110]李玲娟,王汝传.一种基于移动代理的MANET IDS模型[J].计算机工程与应用, 2005, 41(20): 139-141

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700