一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

流量異常檢測(cè)中的直覺(jué)模糊推理方法

范曉詩(shī) 雷英杰 王亞男 郭新鵬

范曉詩(shī), 雷英杰, 王亞男, 郭新鵬. 流量異常檢測(cè)中的直覺(jué)模糊推理方法[J]. 電子與信息學(xué)報(bào), 2015, 37(9): 2218-2224. doi: 10.11999/JEIT150023
引用本文: 范曉詩(shī), 雷英杰, 王亞男, 郭新鵬. 流量異常檢測(cè)中的直覺(jué)模糊推理方法[J]. 電子與信息學(xué)報(bào), 2015, 37(9): 2218-2224. doi: 10.11999/JEIT150023
Fan Xiao-shi, Lei Ying-jie, Wang Ya-nan, Guo Xin-peng. Intuitionistic Fuzzy Reasoning Method in Traffic Anomaly Detection[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2218-2224. doi: 10.11999/JEIT150023
Citation: Fan Xiao-shi, Lei Ying-jie, Wang Ya-nan, Guo Xin-peng. Intuitionistic Fuzzy Reasoning Method in Traffic Anomaly Detection[J]. Journal of Electronics & Information Technology, 2015, 37(9): 2218-2224. doi: 10.11999/JEIT150023

流量異常檢測(cè)中的直覺(jué)模糊推理方法

doi: 10.11999/JEIT150023

Intuitionistic Fuzzy Reasoning Method in Traffic Anomaly Detection

  • 摘要: 針對(duì)網(wǎng)絡(luò)流量特征屬性不確定性和模糊性的特點(diǎn),將直覺(jué)模糊推理理論引入異常檢測(cè)領(lǐng)域,該文提出一種基于包含度的直覺(jué)模糊推理異常檢測(cè)方法。首先設(shè)計(jì)異常檢測(cè)中特征屬性的隸屬度與非隸屬度函數(shù),其次,給出基于包含度的強(qiáng)相似度計(jì)算方法并生成推理規(guī)則庫(kù),再次給出多維多重式直覺(jué)模糊推理規(guī)則,最后建立異常檢測(cè)中的直覺(jué)模糊推理方法。通過(guò)對(duì)異常檢測(cè)標(biāo)準(zhǔn)數(shù)據(jù)集KDD99的實(shí)驗(yàn),驗(yàn)證該方法的有效性,與常見(jiàn)經(jīng)典異常檢測(cè)方法對(duì)比,該方法具有更良好的檢測(cè)效果。
  • Dimitris K and Elpiniki I. Intuitionistic fuzzy reasoning with cognitive maps[C]. Proceedings of the IEEE International Conference on Fuzzy Systems, Taipei, China, 2011: 821-827.
    Chen Cheng-hung. Compensatory neural fuzzy networks with rule-based cooperative differential evolution for nonlinear system control[J]. Nonlinear Dynamics, 2014, 75(1): 355-366.
    Lei Yang, Lei Ying-jie, and Kong Wei-wei. Technique for target recognition based on intuitionistic fuzzy reasoning[J]. IET Signal Processing, 2012, 6(3): 255-263.
    Mitchell H B. Pattern recognition using type-II fuzzy sets[J]. Information Sciences, 2005, 170(2/4): 409-418.
    Hong Peng, Jun Wang, Mario J P J, et al.. Fuzzy reasoning spiking neural P system for fault diagnosis[J]. Information Sciences, 2013, 235: 106-116.
    Luigi L and Larbi B. Using multiple uncertain examples and adaptative fuzzy reasoning to optimize image characterization[J]. Knowledge Based System, 2007, 20(3): 266-276.
    雷英杰, 王寶樹(shù), 王毅. 基于直覺(jué)模糊推理的威脅評(píng)估方法[J].電子與信息學(xué)報(bào), 2007, 29(9): 2077-2081.
    Lei Ying-jie, Wang Bao-shu, and Wang Yi. Techniques for threat assessment based on intuitionistic fuzzy reasoning[J]. Journal of Electronics Information Technology, 2007, 29(9): 2077-2081.
    雷英杰, 王寶樹(shù), 王毅. 基于直覺(jué)模糊決策的戰(zhàn)場(chǎng)態(tài)勢(shì)評(píng)估方法[J]. 電子學(xué)報(bào), 2006, 34(12): 1275-1279.
    Lei Ying-jie, Wang Bao-shu, and Wang Yi. Techniques for battlefield situation assessment based on intuitionistic fuzzy decision[J]. Acta Electronica Sinica, 2006, 34(12): 1275-1279.
    Hwang C M, Yang M S, Hung W L, et al.. A similarity measure of intuitionistic fuzzy sets based on the Sugeno integral with its application to pattern recognition[J]. Infor-
    mation Sciences, 2012, 189: 93-109.
    Boran F E and Akay D. A biparametric similarity measure on intuitionistic fuzzy sets with applications to pattern recognition[J]. Information Sciences, 2014, 255: 45-57.
    王毅, 劉三陽(yáng), 張文, 等. 基于包含度的直覺(jué)模糊相似度量推理方法[J]. 系統(tǒng)工程與電子技術(shù), 2014, 36(3): 497-500.
    Wang Yi, Liu San-yang, Zhang Wen, et al.. Intuitionistic fuzzy similarity measures reasoning method based on inclusion degrees[J]. Systems Engineering and Electronics, 2014, 36(3): 497-500.
    嚴(yán)宣輝. 應(yīng)用疫苗接種策略的免疫入侵檢測(cè)模型[J]. 電子學(xué)報(bào), 2009, 37(4): 780-785.
    Yan Xuan-hui. An artificial immune-based intrusion detection model using vaccination strategy[J]. Acta Electronica Sinica, 2009, 37(4): 780-785.
    Kuang F J ,Xu W H, and Zhang S Y. A novel hybrid KPCA and SVM with GA model for intrusion detection[J]. Applied Soft Computing, 2014, 18(5): 178-184.
    Abadeh M S, Mohamadi H, and Habibi J. Design and analysis of genetic fuzzy systems for intrusion detection in computer networks[J]. Expert Systems with Applications, 2011, 38(6): 7067-7075.
    Karami A and Zapata M G. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks[J]. Neurocomputing, 2014, 149(3): 1253-1269.
    Guo S Q, Gao C, Yao J, et al. An intrusion detection model based on improved random forests algorithm[J]. Journal of Software, 2005, 16(8): 1490-1498.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  1585
  • HTML全文瀏覽量:  157
  • PDF下載量:  611
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-01-06
  • 修回日期:  2015-03-18
  • 刊出日期:  2015-09-19

目錄

    /

    返回文章
    返回