Advanced Search
Volume 31 Issue 2
Dec.  2010
Turn off MathJax
Article Contents
WU Zehui, WEI Qiang, REN Kailei, WANG Qingxian. Dynamic Defense for DDoS Attack Using OpenFlow-based Switch Shuffling Approach[J]. Journal of Electronics & Information Technology, 2017, 39(2): 397-404. doi: 10.11999/JEIT160449
Citation: Hu Zheng-ping, Jia Qian-wen. Rejecting Nearest Neighbor Classifier Based on Structural Risk Minimization Principle Self-organization Multiple Region Covering Model[J]. Journal of Electronics & Information Technology, 2009, 31(2): 293-296. doi: 10.3724/SP.J.1146.2007.01360

Rejecting Nearest Neighbor Classifier Based on Structural Risk Minimization Principle Self-organization Multiple Region Covering Model

doi: 10.3724/SP.J.1146.2007.01360
  • Received Date: 2007-08-27
  • Rev Recd Date: 2008-05-11
  • Publish Date: 2009-02-19
  • According to the mode of rejecting pattern recognition principles, which is based on matter description and matter separation in uniform statistical pattern recognition, a rejecting nearest neighbor classifier based on structural risk minimization self-organization multiple region covering model is presented in this paper. This new model is better closer to the actual instance, rather than traditional statistical pattern recognition only using optimal separationas its main principle. Firstly, the optimal samples are selected from the training samples based on structural risk minimization, which is used for same class pattern matter description. Then the kNN distinguish is as a following step to identified the exact class. The simulation experimental results show that this method is valid and efficient.
  • 王守觉. 仿生模式识别一种模式识别的新模型的理论与方法[J]. 电子学报, 2002, 30(10): 1418-1421.Wang Shou-jue. Bionic (topological) pattern recognitionA new model of pattern recognition theory and itsapplications. Acta Electronica Sinica, 2002, 30(10):1417-1420.[2]吴涛, 张铃, 张燕平. 机器学习中的核覆盖算法[J]. 计算机学报, 2005, 28(8): 1295-1301.Wu Tao, Zhang Ling, and Zhang Yan-ping. Kernel coveringalgorithm for machine learning. Chinese Journal ofComputers, 2005, 28(8): 1295-1301.[3]赵莹, 高隽, 汪荣贵, 胡静. 一种新的广义近邻方法研究[J].电子学报, 2004, 32(F12): 196-198.Zhao Ying, Gao Jun, Wang Rong-gui, and Hu Jing. Extendednearest neighbor method based on bionic pattern recognition.Acta Electronica Sinica, 2004, 32(F12): 196-198.[4]David M J Tax and Robert P W Duin. Support vector datadescription [J].Machine Learning.2004, 54(1):45-66[5]Lee Ki Young, Kim Dae-Won, Lee Kwang H, and LeeDoheon. Density-induced support vector data description[J].IEEE Trans. on Neural Networks.2007, 18(1):284-289[6]Yen Chen-wen, Young Chieh-Neng, and Nagurka Mark L. Afalse acceptance error controlling method for hypersphericalclassifiers[J].Neurocomputing.2004, 57(1-4):295-312[7]Amit B, Philippe B, and Chris D. A support vector methodfor anomaly detection in hyperspectral imagery[J].IEEE Trans.on Geoscience and Remote Sensing.2006, 44(8):2282-2291[8]Rizvi S A, Saasawi T N, and Nasrabadi N M. A clutterrejection technique for FLIR imagery using region basedprincipal component analysis [J].Pattern Recognition.2000,33(11):1931-1933[9]Yang G Z and Huang T S. Human face detection in a complexbackground [J]. Pattern Recognition, 1994, 27(1): 58-63.[10]Cabrera J B D. On the impact of fusion strategies onclassification errors for large ensembles of classifiers. PatternRecognition, 2006, 39(11): 1963-1978.[11]娄震, 金忠, 杨静宇. 基于类条件置信变换的后验概率估计方法[J]. 计算机学报, 2005, 28(1): 18-24.Lou Zhen, Jin Zhong, and Yang Jing-yu. Novel approach toestimate posterior probabilities by class-conditionalconfidence transformations. Chinese Journal of Computers,2005, 28(1): 18-24.
  • Cited by

    Periodical cited type(13)

    1. 王洋,汤光明,王硕,楚江. 基于API调用管理的SDN应用层DDoS攻击防御机制. 网络与信息安全学报. 2022(02): 73-87 .
    2. 刘涛,尹胜. SDN环境中基于交叉熵的分阶段DDoS攻击检测与识别. 计算机应用与软件. 2021(02): 328-333 .
    3. 龚健虎,张跃进. 深度AWB结合改进DIT的高效大数据分类. 计算机工程与设计. 2021(02): 468-474 .
    4. 余庚,陈宏意. 复杂DCN多业务布局优化设计. 科学技术创新. 2021(18): 120-121 .
    5. 宋克,刘勤让,魏帅,张文建,谭力波. 基于拟态防御的以太网交换机内生安全体系结构. 通信学报. 2020(05): 18-26 .
    6. 徐建峰,张方韬,徐震,王利明. 基于嗅探技术的字段操纵攻击研究. 电子与信息学报. 2020(10): 2342-2349 . 本站查看
    7. 石乐义,李阳,马猛飞. 蜜罐技术研究新进展. 电子与信息学报. 2019(02): 498-508 . 本站查看
    8. 陈超,曹晓梅. SDN场景中基于双向流量特征的DDoS攻击检测方法. 计算机应用研究. 2019(07): 2148-2153 .
    9. 雷明涛,柯昌骏,朱昊,李晓禹. 基于OpenFlow的软件定义网络防火墙设计. 信息化研究. 2018(02): 29-34 .
    10. 许文庆,余庚. SDN架构下数据流量调度算法的设计. 光通信研究. 2018(03): 5-8+20 .
    11. 吴路明,裘愉涛,陈琦. 基于SDN的电力通信网络关键技术综述. 电力工程技术. 2018(03): 134-144 .
    12. 王杨俊杰,解忧,张卫涛. SDN中基于卡方检验的DDoS防御. 计算机工程与设计. 2018(09): 2743-2747 .
    13. 李恒,沈华伟,程学旗,翟永. 网络高流量分布式拒绝服务攻击防御机制研究综述. 信息网络安全. 2017(05): 37-43 .

    Other cited types(12)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3492) PDF downloads(924) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return