{"title":"基于学习技术的网络入侵检测新框架","authors":"Wei Lu","doi":"10.1109/PACRIM.2005.1517325","DOIUrl":null,"url":null,"abstract":"We propose in this paper a novel network intrusion detection framework based on learning techniques. The main goal of our framework is to detect known as well as unknown or novel attacks on networks. Our detection approach combines three learning techniques, namely inductive logic programming (ILP), genetic programming (GP) and Bayesian probability theorem. Each technique detects the intrusion independently and then makes a decision about whether the network behavior is intrusive or normal. A voting mechanism is proposed to give the final intrusion decision. In theory, our framework has lower false alarm rate than other approaches since we use the voting mechanism and combine several detection techniques.","PeriodicalId":346880,"journal":{"name":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A novel framework for network intrusion detection using learning techniques\",\"authors\":\"Wei Lu\",\"doi\":\"10.1109/PACRIM.2005.1517325\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose in this paper a novel network intrusion detection framework based on learning techniques. The main goal of our framework is to detect known as well as unknown or novel attacks on networks. Our detection approach combines three learning techniques, namely inductive logic programming (ILP), genetic programming (GP) and Bayesian probability theorem. Each technique detects the intrusion independently and then makes a decision about whether the network behavior is intrusive or normal. A voting mechanism is proposed to give the final intrusion decision. In theory, our framework has lower false alarm rate than other approaches since we use the voting mechanism and combine several detection techniques.\",\"PeriodicalId\":346880,\"journal\":{\"name\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PACRIM.2005.1517325\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM.2005.1517325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel framework for network intrusion detection using learning techniques
We propose in this paper a novel network intrusion detection framework based on learning techniques. The main goal of our framework is to detect known as well as unknown or novel attacks on networks. Our detection approach combines three learning techniques, namely inductive logic programming (ILP), genetic programming (GP) and Bayesian probability theorem. Each technique detects the intrusion independently and then makes a decision about whether the network behavior is intrusive or normal. A voting mechanism is proposed to give the final intrusion decision. In theory, our framework has lower false alarm rate than other approaches since we use the voting mechanism and combine several detection techniques.