Research on the application of improved V-detector algorithm in network intrusion detection

被引:0
|
作者
Zhong Y. [1 ]
Chen L. [2 ]
机构
[1] Educational Technology and Information Center, Guangzhou Panyu Polytechnic, Guangdong, Guangzhou
[2] School of Law, South China Normal University, Guangdong, Guangzhou
关键词
False alarm rate; Improved V-detector algorithm; Multilayer network; Network intrusion;
D O I
10.2478/amns.2023.2.00526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network intrusion detection has been widely discussed and studied as an important part of protecting network security. Therefore, this paper presents an in-depth study of the application of an improved V-detector algorithm in network intrusion detection. In this paper, we construct a V-detector intrusion detection model, adopt the “self-oriented” identification principle, and randomly generate detectors with large differences from the health library. A smaller number of detectors are used to compare the data information generated by the computer, and if they are similar, they are judged as intrusions. Intrusion detection experiments are performed on multiple types of networks by using classifiers to determine whether the access to be detected is an attack access. The experimental results show that the model has the lowest false alarm rate for mixed feature networks, with a false alarm rate of only 13% and a detection rate of 89%, with a sample size of 25,987. After the improvement of the V-detector intrusion detection model, the error correction output problem leads to a network intrusion with a miss rate of only 11% and a protection rate of 85%. The experimental data proved that the model has the advantages of large data size and comprehensive intrusion attack types. © 2023 Yuming Zhong and Leyou Chen, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [41] Research on Intrusion Detection Model Based on improved CPN algorithm
    Luo, Jin-guang
    He, Biao
    Lv, Jinyang
    [J]. 2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018), 2019, 1176
  • [42] Research on intrusion detection model based on improved MLP algorithm
    Qihao Zhao
    Fuwei Wang
    Weimin Wang
    Tianxin Zhang
    Haodong Wu
    Weijun Ning
    [J]. Scientific Reports, 15 (1)
  • [43] Improved fuzzy clustering algorithm and its application to intrusion detection
    Chen, Jianmei
    Song, Shunlin
    Lu, Hu
    Song, Yuqing
    Zhu, Yuquan
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2007, 37 (04): : 589 - 592
  • [44] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [45] A Computer network intrusion detection technology based on improved neural network algorithm
    Liu R.X.
    [J]. Liu, R.X. (run4yp@163.com), 1600, Begell House Inc. (79): : 593 - 601
  • [46] The design of improved Elman network intrusion detection algorithm in digital campus network
    Wang, Jingjing
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 2096 - 2099
  • [47] Research on Intrusion Detection Based on an Improved SOM Neural Network
    Jiang, Dianbo
    Yang, Yahui
    Xia, Min
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 400 - 403
  • [48] Research on the performance analysis of network intrusion detection of AC algorithm
    Zhao Dongming
    [J]. ADVANCED RESEARCH ON MATERIAL SCIENCE, ENVIROMENT SCIENCE AND COMPUTER SCIENCE III, 2014, 886 : 646 - 649
  • [49] Research on Intrusion Detection Algorithm Based on BP Neural Network
    Qiu, Chunmin
    Shan, Jie
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 259 - 270
  • [50] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    [J]. FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +