簡易檢索 / 詳目顯示

研究生: 柯萬保
Ko, Wan-Pao
論文名稱: 應用支援向量機及基因演算法降低入侵偵測系統之不對稱型誤判成本
Using Support Vector Machine and Genetic Algorithm to Reduce Asymmetric Cost in Intrusion Detection System
指導教授: 吳植森
Wu, Chih-Sen
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理研究所
Institute of Information Management
論文出版年: 2006
畢業學年度: 94
語文別: 中文
論文頁數: 60
中文關鍵詞: 支援向量機資料探勘入侵偵測系統基因演算法特徵選取
外文關鍵詞: Data Mining, Feature Selection, Intrusion Detection System, Genetic Algorithm, Support Vector Machine
相關次數: 點閱:154下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   現今網際網路環境的蓬勃發展,系統安全漏洞頻傳,駭客入侵事件時有所聞,突顯出網路資訊安全領域的重要性,而入侵偵測系統(Intrusion Detection System)已經成為重要的研究領域。過去文獻常著重在於提升入侵偵測預測準確率,但實際應用上,由於網路封包傳輸量大且持續成長的特性,傳統的法則庫模式與特徵比對技術,常出現誤判的狀況,當誤判率過高,管理人員疲於調查追蹤錯誤的警訊,而造成安全設備與安全管理人員的效率降低。另外,傳統模式並未考量不同類型的誤判會造成不同的影響,因為成功入侵和誤擋正常封包造成的影響不同,一般而言,企業對於錯誤拒絕(False Negative)較錯誤接受(False Positive)須要付出更大的代價。

      因此,本研究以UCI KDD’99(Knowledge Discovery in Databases Archive) 入侵偵測資料集,透過資料精簡方法來減少資料量,選取具有代表性的資料樣本,並應用支援向量機進行分類,並以基因演算法(Genetic Algorithm)透過估計誤判成本調整放射(Radial Basis Function, RBF)核心支援向量機參數γ及c,以降低入侵偵測系統之不對稱型誤判成本(Asymmetric Error Cost)。

      研究結果顯示,在入侵偵測的領域中,採用基因演算法修正支援向量機參數相較於傳統網格搜尋法及普通支援向量機模式在多數情形下可有效降低不對稱型誤判成本,並可透過權重的設定以符合企業實務上的需求,以降低發生攻擊的可能性。

    Owing to the development of Internet, system security problems and intrusion of hacker happened frequently. People begin to notice the importance of Internet information security gradually. Besides, intrusion detection system has also become main research field. In the past, most literature only focused on improving the accuracy of predicting intrusion detection. However, in practice, because of the hugeness and continuous growing of network packet, traditional rule bases and feature matching skills still couldn’t decrease the error rate. What’s more, managers are tired of investigating and tracking error signals, and it caused low efficiency of security equipment and information workers. Seeing that the situation of successful intrusion and wrong rejecting normal packet may lead to different influences, the business has to pay more for False Negative (FN) than False Positive (FP).

    Therefore, in the study, the intrusion detection dataset of UCI KDD’99 (Knowledge Discovery in Databases Archive) was used to choose meaningful features and representative instances with a view to reducing attribute dimensions. Then, Support Vector Machine (SVM) was applied to perform classification. Finally, use genetic algorithm (GA) by evaluating error cost to adjust SVM parameters with Radial Basis Function (RBF) as the kernel function. By doing so, it could reduce asymmetric error cost of intrusion detection system.

    The study reached major conclusion that it could effectively reduce the asymmetric error cost of intrusion detection, and meet business’ demand by setting weights.

    摘要 I Abstract II 誌謝 III 目次 IV 圖目錄 VI 表目錄 VII 第一章 緒論 1  第一節 研究背景及動機 2  第二節 研究目的 3  第三節 研究流程 3  第四節 研究範圍及限制 4 第二章 文獻探討 6  第一節 入侵偵測系統 6  第二節 資料探勘 11  第三節 特徵選取 13  第四節 支援向量機 15  第五節 基因演算法 23 第三章 研究方法 25  第一節 研究架構及步驟 25  第二節 資料前處理及特徵選取 28  第三節 支援向量機分類及成本評估模式 30 第四章 實證分析 33  第一節 資料來源及使用軟體 33  第二節 資料前處理 36  第三節 特徵選取 39  第四節 使用小樣本計算不對稱型成本 41  第五節 基因演算法調整支援向量機參數 43  第六節 基因演算法與網格搜尋法之比較 47 第五章 結論與建議 50  第一節 研究結論 50  第二節 研究建議 51 參考文獻 52  一、中文部分 52  二、英文部分 52  三、網站部分 54 附錄一:KDD’99 資料集欄位說明 55 附錄二:資訊獲得量計算及排序結果 57

    一、中文部分
    曾憲雄、蔡秀滿、蘇東興、曾秋蓉、王慶堯,資料探勘,旗標出版,民94。
    陳至哲,資通訊安全關鍵技術發展藍圖,資策會出版,頁31-46,民93。
    吳志聰,「以特徵探勘提升入侵偵測系統效率」,私立中原大學,民92。
    李駿偉,「入侵偵測系統分析方法效能之定量評估」,私立中原大學,民91。

    二、英文部分
    Balajinath, B. and Raghavan, S.V.(2001), “Intrusion detection through learning behavior model” Computer Communications 24, pp.1202-1212

    Beghdad, R.(2004), “Modelling and solving the intrusion detection problem in computer networks”, Computers & Security 23, pp.687-696

    Biermann, E., Cloete, E.and Venter, L.M.(2001), “"A comparison of Intrusion Detection systems”, Computers & Security 20, pp. 676-683

    Chen, W.H., Hsu, S.H. and Shen, H.P.(2005), “Application of SVM & ANN for intrusion detection”, Computer and Operations Research 32, pp.2617-2634

    Cristianini, N., and Shawe-Taylor J.(2000), “An Introduction to Support Vector Machines and Other Kernel-based Learning Methods”, Cambridge University Press


    Dash, M. and Liu, H.(1997), “Feature selection for classification”, Intelligent Data Analysis 1, pp.131-156.

    Han, S.J and Cho, S.B.(2003), “Detecting intrusion with rule-based integration of multiple models”, Computers & Security 22, pp.613-623

    Indurkhya, N. and Weiss, Sholom M.(1998),”Estimating Performance Gains for Voted Decision Trees”, Intelligent Data Analysis 2, pp.303-310

    Joo, D., Hong, T. and Han, I.(2003), “The neural network models for IDS based on the asymmetric cost of false negative errors and false positive errors”, Expert Systems with Applications 25, pp.69-75

    Kantardzic M.(2003), “Data mining concepts, models, methods, and algorithms”, IEEE Press

    Kim, H.S. and Cha, S.D.(2005), “Empirical evaluation of SVM-based masquerade detection using UNIX commands” Computers & Security 24, pp.160-168

    Li, F., Guan, X.H., Gao Y. and Liu, P.(2004), “Predicting the intrusion intensions by observing system call sequences”, Computers & Security, pp.241-252

    Lippmann, R.P. and Cunningham, R.K.(2000), “Improving intrusion detection performance using keyword selection and neural networks”, Computer Networks 34, pp. 597-603

    Mukkamala, S., Sung, A.H. and Abraham, A.(2005), “Intrusion detection using an ensemble of intelligent paradigms”, Journal of Network and Computer Applications 28, pp.167-182

    Ning, P., Jajodia, S. and Wang, X.S.(2002), “Design and implementation of a decentralized prototype system for detecting distributed attacks”, Computer Communications 25, pp. 1374-1391

    Rohrmair, G.T. and Lowe, G.(2005), “Using data-independence in the analysis of intrusion detection systems”, Theoretical Computer Science 340, pp.82-101

    Roiger, J.R. and Geatz, W.M. ,”Data Mining : A Tutorial Based Primer”, Addison Wesley


    Sebban, M. and Nock, R. (2002), "A hybrid filter/wrapper approach of feature selection using information theory", Pattern Recognition 35, pp. 835-846

    Samata, B.(2004), “Gear fault detection using artificial neural networks and support vector machines with genetic algorithms”, Mechanical Systems and Signal Process 18, pp.625-644

    Verwoerd, T. and Hunt, R.(2002), “Intrusion detection techniques and approaches”, Computer Communications 25, pp.1356-1365

    Zhang, Z. and Shen, H.(2005). “Application of online-training SVMs for real-time intrusion detection with different considerations”, Computer Communications 28, pp.1428-1442

    Zorkadis, V., Karras, D.A. and Panayotou, M.(2005), “Efficient information theoretic strategies for classifier combination, feature extraction and performance evaluation in improving false positive and false negative for spam e-mail filtering”, Neural Networks 18, pp.799-807

    三、網站部分
    UCI KDD Archive
    http://kdd.ics.uci.edu/

    CERT/CC Statistics 1995-2006
    http://www.cert.org/stats/cert_stats.html

    LibSVM
    http://www.csie.ntu.edu.tw/~cjlin/libsvm/

    Bioweka
    http://bioweka.sourceforge.net/

    下載圖示 校內:2011-08-14公開
    校外:2011-08-14公開
    QR CODE