Research on an Improved Intrusion Detection Algorithm

被引:1
|
作者
Liu, Yue [1 ]
Li, Mei-shan [1 ]
机构
[1] Jiamusi Univ, Coll Informat Sci & Elect Technol, Jiamusi 154007, Peoples R China
关键词
network security; intrusion detection; back propagation neural network; distributed neural network intrusion algorithm;
D O I
10.14257/ijsia.2016.10.11.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
First of all, the principle of neural network is discussed, and the traditional BP network learning algorithm and BP neural network adaptive learning algorithm are researched. Combining the advantages of two algorithms, the distributed neural network self-learning algorithm is proposed, which is a kind of intrusion detection algorithm using the method of distributed learning to optimize the BP neural network algorithm. Using this algorithm to study and test the network intrusion data, it solves the problem that directly using BP learning caused by the training sample size too large and difficult to convergence. At the same time, the sample training time is shortened, and the BP neural network classification accuracy is improved. Secondly, based on the research of the improved algorithm, this paper gives the specific steps of the algorithm, and uses the improved algorithm to establish mathematical model which is used to analyzing and forecasting. Compared with the traditional BP network learning algorithm and BP neural network adaptive learning algorithm, verify the effectiveness and feasibility of the improved algorithm. Finally, the algorithm is applied to intrusion detection. Through appropriate test method, use the sample data of this paper adopted to verify the example. Through the results of the testing data, it verifies the performance of the distributed neural network self-learning algorithm, and comes to the conclusion.
引用
收藏
页码:303 / 316
页数:14
相关论文
共 50 条
  • [31] Research on Intrusion Detection Technology Based on Immune Algorithm
    Zhu, Kai
    Meng, Xiangru
    Ma, Zhiqiang
    [J]. KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 759 - 762
  • [32] Intrusion Detection Technology Research Based on Apriori Algorithm
    Li Hanguang
    Ni Yu
    [J]. INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1615 - 1620
  • [33] The Research of Intrusion Detection Based on Mixed Clustering Algorithm
    Liu, Nanyan
    [J]. COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 92 - 100
  • [34] RESEARCH AND IMPLEMENTATION OF INTRUSION DETECTION ALGORITHM IN VIDEO SURVEILLANCE
    Wang, Jin-xiang
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING (ICALIP), 2016, : 345 - 348
  • [35] Intrusion detection research based on SVM and intelligence algorithm
    Zhao, Jian-hua
    Li, Wei-hua
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (16) : 445 - 452
  • [36] Binary improved white shark algorithm for intrusion detection systems
    Alawad, Noor Aldeen
    Abed-alguni, Bilal H.
    Al-Betar, Mohammed Azmi
    Jaradat, Ameera
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (26): : 19427 - 19451
  • [37] STUDY ON NETWORK INTRUSION DETECTION BASED ON IMPROVED APRIORI ALGORITHM
    Yang, Nini
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 372 - 374
  • [38] Improved Intrusion Detection Algorithm based on TLBO and GA Algorithms
    Aljanabi, Mohammad
    Ismail, MohdArfian
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (02) : 170 - 179
  • [39] Binary improved white shark algorithm for intrusion detection systems
    Noor Aldeen Alawad
    Bilal H. Abed-alguni
    Mohammed Azmi Al-Betar
    Ameera Jaradat
    [J]. Neural Computing and Applications, 2023, 35 : 19427 - 19451
  • [40] Improved K-means clustering algorithm in intrusion detection
    Xiao, ShiSong
    Li, XiaoXu
    Liu, XueJiao
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 771 - 775