The Application of Genetic Neural Network in Network Intrusion Detection

被引:7
|
作者
Jiang, Hua [1 ]
Ruan, Junhu [1 ]
机构
[1] Hebei Univ Engn, Sch Econ & Management, Handan, Peoples R China
关键词
Terms-network intrusion detection; genetic algorithm; BP neural network; genetic neural network;
D O I
10.4304/jcp.4.12.1223-1230
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Traditional network security models have not meet the development of network technologies, so PPDR model emerged, as the times require. Instruction detection technology is an important composed part in PPDR model and it make up for the shortages of firewall and data security protection. This technology has not only distinguished from computer and network resources, but also has given important information in instruction; it has not only detected instructing action from out word, but also has controlled user's actions. Instruction detection technology is the core in instruction detection system, it include abnormity instruction and abused instruction detection. However, how to detect whether there are intrusions is a problem to need solving first. According to the high missing report rate and high false report rate of existing intrusion detection systems, the paper proposed an anomaly intrusion detection model based on genetic neural network, which combined the good global searching ability of genetic algorithm with the accurate local searching feature of BP networks to optimize the initial weights of neural networks. The practice overcame the shortcomings in BP algorithm such as slow convergence, easily dropping into local minimum and weakness in global searching. Simulation results showed that the practice worked well, fast learning speed and high-accuracy categories.
引用
收藏
页码:1223 / 1230
页数:8
相关论文
共 50 条
  • [1] Network Intrusion Detection Using Genetic Algorithm and Neural Network
    Gomathy, A.
    Lakshmipathi, B.
    [J]. ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, 2011, 198 : 399 - 408
  • [2] Study on the Network Intrusion Detection Model Based on Genetic Neural Network
    Jiang Hua
    Zhao Xiaofeng
    [J]. WMSO: 2008 INTERNATIONAL WORKSHOP ON MODELLING, SIMULATION AND OPTIMIZATION, PROCEEDINGS, 2009, : 60 - +
  • [3] Genetic convolutional neural network for intrusion detection systems
    Nguyen, Minh Tuan
    Kim, Kiseon
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 418 - 427
  • [4] THE RESEARCH OF INTRUSION DETECTION BASED ON GENETIC NEURAL NETWORK
    Zhou, Tie-Jun
    Yang, Li
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1 AND 2, 2008, : 276 - 281
  • [5] Application of PSO-RBF Neural Network in Network Intrusion Detection
    Chen, Zhifeng
    Qian, Peide
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 362 - 364
  • [6] Evolutionary Convolutional Neural Network: An Application to Intrusion Detection
    Chen, Yi
    Chen, Shuo
    Xuan, Manlin
    Lin, Qiuzhen
    Wei, Wenhong
    [J]. 2021 13TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2021, : 245 - 252
  • [7] Application of Improved BP Neural Network with Correlation Rules in Network Intrusion Detection
    Cui, Yongfeng
    Ma, Xiangqian Li
    Liu, Zhijie
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 423 - 430
  • [8] An intrusion detection model based on genetic algorithm and neural network
    Xiong, Zhongyang
    Zhang, Yufang
    Cheng, Daijie
    Liu, Daoqun
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 3416 - 3421
  • [9] Research on Intrusion Detection Based on Heuristic Genetic Neural Network
    Zhang, Biying
    [J]. ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 2, 2012, 149 : 567 - 573
  • [10] Intrusion Detection Based on BP Neural Network and Genetic Algorithm
    Zhao Jian-hua
    Li Wei-hua
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 438 - 444