New Method for Intrusion Detection Based on BPNN and Improved GA Optimization

作者: Yuesheng Gu , Yanpei Liu , Hongyu Feng

DOI: 10.1007/978-3-642-27452-7_59

关键词:

摘要: It’s very important to detect the network attacks protect information security. The intrusion patter identification is a hot topic and using artificial neural networks (ANN) provide intelligent recognition has been received lot of attentions. However, detection rate often affected by structure parameters ANN. Improper ANN model design may result in low precision. To overcome these problems, new approach based on improved genetic algorithm (GA) BPNN classifiers proposed this paper. GA used energy entropy select individuals optimize training procedure BPNN, satisfactory with proper parameters. efficiency method was evaluated practical data. experiment results show that offers good rate, performs better than standard GA-BPNN method.

参考文章(15)
Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong, Learning Fingerprints for a Database Intrusion Detection System european symposium on research in computer security. pp. 264- 280 ,(2002) , 10.1007/3-540-45853-0_16
Teuvo Kohonen, Self-Organizing Maps ,(1995)
Zhong Yu Huang, Zhi Qiang Yu, Zhi Xiong Li, Yuan Cheng Geng, A Fault Diagnosis Method of Rolling Bearing through Wear Particle and Vibration Analyses Applied Mechanics and Materials. pp. 676- 681 ,(2010) , 10.4028/WWW.SCIENTIFIC.NET/AMM.26-28.676
Zhixiong Li, Xinping Yan, Chengqing Yuan, Jiangbin Zhao, Zhongxiao Peng, A Fault Diagnosis Approach for Gears Using Multidimensional Features and Intelligent Classifier Noise & Vibration Worldwide. ,vol. 41, pp. 76- 86 ,(2010) , 10.1260/0957-4565.41.10.76
Fu Xiang, Zheng Zheng-jian, Research on complex electronic equipment fault location based on improved Genetic Algorithm international conference on computer engineering and technology. ,vol. 1, ,(2010) , 10.1109/ICCET.2010.5486043
Chang Wook Ahn, R.S. Ramakrishna, A genetic algorithm for shortest path routing problem and the sizing of populations IEEE Transactions on Evolutionary Computation. ,vol. 6, pp. 566- 579 ,(2002) , 10.1109/TEVC.2002.804323
Stuart J. Russell, Peter Norvig, Artificial Intelligence: A Modern Approach ,(2020)
S.C. Lee, D.V. Heinbuch, Training a neural-network based intrusion detector to recognize novel attacks systems man and cybernetics. ,vol. 31, pp. 294- 299 ,(2001) , 10.1109/3468.935046
Nong Ye, S. Vilbert, Qiang Chen, Computer intrusion detection through EWMA for autocorrelated and uncorrelated data IEEE Transactions on Reliability. ,vol. 52, pp. 75- 82 ,(2003) , 10.1109/TR.2002.805796
Wang Cong, Hybrid Feature Transformation Based on Modified Particle Swarm Optimization and Support Vector Machine Journal of Beijing University of Posts and Telecommunications. ,(2009)