RETRACTED: Research on network intrusion detection technology based on improved FCMA algorithm (Retracted Article)

被引:0
|
作者
Li, Hanguang [1 ]
机构
[1] Hainan Vocat Coll Polit Sci & Law, Haikou 571100, Hainan, Peoples R China
关键词
FCMA; Network intrusion; Control theory; Boundary analysis;
D O I
10.1007/s12652-021-03145-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the process of science and technology development, although the control object is becoming more and more complex, the requirements for control performance are increasing. The contradiction of traditional control theory in FCMA algorithm is increasingly prominent in practical application, especially in robot control research and learning control, which is in urgent need of new vitality. At this time, a new control mode in the field of control, namely intelligent control, arises at the historic moment, which is a leap forward of control mode. In recent decades, the rapid development of the Internet and the development of a large scale, to avoid the belt to a variety of network intrusion, these network intrusion almost every moment. Network intrusion detection is an important way of computer security detection. It can identify the flow of external intrusion in the network, and carry out early warning processing. The network intrusion detection based on FCMA transforms the intrusion detection into the classification of network traffic, establishes a network traffic classification model, and classifies the network traffic by using machine learning classification standards, and detects the external intrusion traffic. Based on FCMA algorithm, this paper explores the method of network intrusion identification, and focuses on the data imbalance processing and feature selection in the process of network intrusion identification.
引用
收藏
页码:103 / 103
页数:11
相关论文
共 50 条
  • [1] RETRACTED ARTICLE: Research on network intrusion detection technology based on improved FCMA algorithm
    Hanguang Li
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 103 - 103
  • [2] RETRACTED: Research on Improved Routing Algorithm Based on QoS Network (Retracted Article)
    Liu Xiaoyue
    Wang Ping
    IEEE: 2009 INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS AND E-GOVERNMENT, 2009, : 221 - +
  • [3] RETRACTED: Research on Lung Nodule Detection Based on Improved Target Detection Network (Retracted Article)
    Li, Ye
    Wu, Qian
    Sun, Hongwei
    Wang, Xuewei
    COMPLEXITY, 2020, 2020
  • [4] RETRACTED: Mobile network intrusion detection for IoT system based on transfer learning algorithm (Retracted Article)
    Deng, Lianbing
    Li, Daming
    Yao, Xiang
    Cox, David
    Wang, Haoxiang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9889 - S9904
  • [5] RETRACTED: Design of Network Intrusion Detection Model Based on TCA (Retracted Article)
    Wen, Quan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] RETRACTED: Computer Communication Network Fault Detection Based on Improved Neural Network Algorithm (Retracted Article)
    Na, Yong
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [7] RETRACTED: Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network (Retracted Article)
    Lu, Yi
    Liu, Menghan
    Zhou, Jie
    Li, Zhigang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] RETRACTED: Research on Fingerprint Security Based on Improved Yolo Algorithm (Retracted Article)
    Lu, Xuefeng
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [9] RETRACTED: An Intrusion Detection Model Based on Improved ACGAN in Big Data Environment (Retracted Article)
    Liao, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [10] RETRACTED ARTICLE: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm
    Yazi Wang
    Yingbo Liang
    Huaibo Sun
    Yuankun Ma
    Cluster Computing, 2020, 23 : 1927 - 1936