RETRACTED: Research on network intrusion detection technology based on improved FCMA algorithm (Retracted Article)

被引:0
|
作者
Li, Hanguang [1 ]
机构
[1] Hainan Vocat Coll Polit Sci & Law, Haikou 571100, Hainan, Peoples R China
关键词
FCMA; Network intrusion; Control theory; Boundary analysis;
D O I
10.1007/s12652-021-03145-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the process of science and technology development, although the control object is becoming more and more complex, the requirements for control performance are increasing. The contradiction of traditional control theory in FCMA algorithm is increasingly prominent in practical application, especially in robot control research and learning control, which is in urgent need of new vitality. At this time, a new control mode in the field of control, namely intelligent control, arises at the historic moment, which is a leap forward of control mode. In recent decades, the rapid development of the Internet and the development of a large scale, to avoid the belt to a variety of network intrusion, these network intrusion almost every moment. Network intrusion detection is an important way of computer security detection. It can identify the flow of external intrusion in the network, and carry out early warning processing. The network intrusion detection based on FCMA transforms the intrusion detection into the classification of network traffic, establishes a network traffic classification model, and classifies the network traffic by using machine learning classification standards, and detects the external intrusion traffic. Based on FCMA algorithm, this paper explores the method of network intrusion identification, and focuses on the data imbalance processing and feature selection in the process of network intrusion identification.
引用
收藏
页码:103 / 103
页数:11
相关论文
共 50 条
  • [21] RETRACTED: Intrusion detection in cloud environment using hybrid genetic algorithm and back propagation neural network (Retracted Article)
    Manimurugan, S.
    Manimegalai, P.
    Valsalan, Prajoona
    Krishnadas, J.
    Narmatha, C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (16)
  • [22] RETRACTED: Forest management and resource monitoring based on AMI intrusion detection algorithm and artificial intelligence (Retracted Article)
    Huang, Chong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (Suppl 1) : 49 - 49
  • [23] RETRACTED: Optimization Algorithm of Communication Resource Allocation in a Complex Network Based on an Improved Neural Network (Retracted Article)
    Zhang, Haomiao
    Liu, Qing
    JOURNAL OF FUNCTION SPACES, 2022, 2022
  • [24] RETRACTED: Research on the QoS Control Technology in Overlay Network Based on Distribution Application (Retracted Article)
    Li, Dengshi
    Yan, Bin
    Guo, Xi
    2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11
  • [25] RETRACTED: Research on Classification Method of Network Resources Based on Modified SVM Algorithm (Retracted Article)
    Zhang, Hao
    Hu, Jingchao
    Zhang, Yaodong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] RETRACTED: Research on pre- and post-fund performance prediction based on improved neural network algorithm (Retracted Article)
    Zhang, Tianyang
    Yu, Jiuhong
    Yu, Jihon
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (Suppl 1) : 107 - 107
  • [27] RETRACTED: Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network (Retracted Article)
    Wang, Chao
    Wang, Bailing
    Sun, Yunxiao
    Wei, Yuliang
    Wang, Kai
    Zhang, Hui
    Liu, Hongri
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] RETRACTED: Anomaly Intrusion Detection of Wireless Communication Network-Based on Markov Chain Model (Retracted Article)
    Zhang, Huifang
    Lan, Wangsen
    Zhang, Desheng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] RETRACTED: Artificial intelligence recruitment text automatic generation based on light detection and improved neural network algorithm (Retracted Article)
    Huang, Xinbin
    Huang, Yu
    Mercado, Cecilia
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (02)
  • [30] RETRACTED: Application of Data Mining Technology in Software Intrusion Detection and Information Processing (Retracted Article)
    Zhao, Xuemin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022