期刊文献+

基于PCA的BP神经网络分类器 被引量:3

BP Neural Network Classifier Based on Principal Component Analysis
下载PDF
导出
摘要 由于入侵检测处理的多为高维数据,为了提高入侵检测的效率和准确率,提出了一种基于主成分分析(PCA)的特征提取方法,对数据源进行特征降维,将获得的主成分作为BP神经网络的输入进行数据识别.同时介绍了M atlab中相关函数,并与传统入侵检测方法进行了比较.实验结果表明:基于主成分分析的特征提取方法在简化BP神经网络规模的同时,显著提高了入侵检测识别效果. A feature extraction method using principal component analysis is proposed to improve the efficiency and accuracy of intrusion detection, which always has high - dimensional data. This method reduces data dimensions and views some principal components as the inputs of BP neural network to finish data recognition. Meanwhile, this paper introduces some correlative functions used in MATLAB and makes a comparison with traditional intrusion detection method. The experimental results show that the scale of BP neural network is simplified and recognition effect is improved remarkably.
出处 《重庆工学院学报(自然科学版)》 2009年第7期89-96,共8页 Journal of Chongqing Institute of Technology
基金 重庆市自然科学基金资助项目(CSTC 2005BA2003)
关键词 入侵检测 主成分分析 特征提取 BP神经网络 MATLAB intrusion detection feature extraction principal component analysis BP neural network Mafia])
  • 相关文献

参考文献10

  • 1Denning D. An Intrusion-Detection Model [ J ]. IEEE Transactions on Software Engineering, 1987.13 ( 2 ) : 222 ' 232.
  • 2俞研,黄皓.面向入侵检测的基于多目标遗传算法的特征选择[J].计算机科学,2007,34(3):197-200. 被引量:9
  • 3KRUEGEL C, MUTZ D, ROBERTSON W. Bayesian event classification for intrusion detection [ C ]//Proceedings of the19^th Annual Computer Security Applications Conference. Nevada USA :Las Vegas , 2003:8 - 12.
  • 4YU XIN-WEI, MU QING-WU.. KFDA-waveletcluster based intrusion detection technology [ C ]//Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition. Beijing: [ s. n. ], 2007.
  • 5LI ZHI-JUN, WU YU, WANG GUO-YIN, et al. A new framework for intrusion detection based on rough set theory [ C ]//Proceedings of the International Conference on Knowledge Discovery Data Mining. USA :Seattle WA , 2004:12 - 13.
  • 6The University of California Irvine KDD Archive [EB/OL], [2007 -06 -26]. http://kdd.ics.uci. edu/ databases/kddcup99/kddcup99.html.
  • 7JOO D, HONG T, HAN I. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors [ J ]. Expert Systems with Applications,2003,25 ( 1 ) :69 - 75.
  • 8Xiao-Bai Li. A scalable decision tree system and its application in pattern recog nition and intrusion detection[ J]. Decision SUpport System, 2005, 41 (1) : 112 - 130.
  • 9Lunteren J V. High performance pattern matching forintrusion detection [ C ] //The 25th Conference on Computer Communications. Barcelona: Catalunya, 2006:23 - 29.
  • 10傅涛,孙文静,孙亚民,崔萌萌.基于免疫学原理的混合入侵检测系统的设计与实现[J].计算机科学,2008,35(6):63-66. 被引量:3

二级参考文献15

  • 1Liu Huan,Yu Lei.Toward Integrating Feature Selection Algorithms for Classification and Clustering.IEEE transactions on Knowledge and Data Engineering,2005,17(3):491~502
  • 2Lee Wenke,Stolfo S J,Mok K W.A Data Mining Framework for Building Intrusion Detection Models.In:Proceedings of the 1999IEEE Symposium on Security and Privacy,Oakland,California,May 1999
  • 3Sung A H,Mukkamala S.Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks.In:Proceedings of International Symposium on Applications and the Internet (SAINT 2003),2003.209~217
  • 4Chebrolu S,Abraham A,Thomas J P.Hybrid Feature Selection for Modeling Intrusion Detection Systems.In:the 11^th International Conference on Neural Information Processing (ICONIP04),2004
  • 5Fonseca C M,Fleming P J.An Overview of Evolutionary Algorithma in Multiobjective Optimization.Evolutionary Computation,1995,3(1):1~16
  • 6Goldberg D E.Genetic Algorithms in Search,Optimization and Machine Learning.New York:Addison Wesley,1989
  • 7Deb K,Pratap A,Agarwal S,et al.A Fast and Elitist Multi-objective Genetic Algorithm:NSGA-Ⅱ.IEEE Transcation on Evolutionary Computation,2002,6(2):181~197
  • 8Mukkamala S,Sung A H,Abraham A.Intrusion detection using an ensemble of intelligent paradigms.Journal of Network and Computer Applications,2005,28(2):167~182
  • 9Joshi M,Agarwal R,Kumar V.Predicting Rare Classes:Can Boosting Make Any Weak Learner Strong?.In:Proceedings of Eight ACM Conference ACM SiGKDD International Conference on Knowledge Discovery and Data Mining,Edmonton,Canada,2002
  • 10The UCI KDD Archive.KDD99 cup dataset.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,1999

共引文献10

同被引文献33

  • 1龚安,张敏.BP网络自适应学习率研究[J].科学技术与工程,2006,6(1):64-66. 被引量:18
  • 2Vogl T P, Mangis J K, Zigler A K, et al. Accelerating the convergence of the back propagation method [ J ]. Bio Cybern, 1998 ,59:246 - 264.
  • 3Rivas M A, Harbour M G. Ada RTS POSIX-extending ada' s real - time system annex with the POSIX scheduling services[J]. Ada Letters,2001,21 ( 1 ).
  • 4Martin T, Hagan Howard B, Demuth M H. Beale 神经网络设计[M].戴葵,译.北京:北京机械工业出版社,2002:201-205.
  • 5Deniz Erdogmus. Oscar Fontenla-Romero. Linear-Least. Squares initialization of muitilayer perceptrons through backpropagation of the desired response[ J ]. IEEE Transactions on NeuraI Network. 2005,16 ( 2 ) : 325 - 337.
  • 6Petr K,Bogdan G,Sibylle S.Data - driven soft sensors in the process industry[J]. Computers and Chemical Engi- neering,2009,33 (4) :795 -814.
  • 7Chen C,Yan X. Optimization of a mulfihyer neural net- work by usiag minimal redtmdancy maximal relevance- partial mutual information clustering with least square regression[J]. IEEE Transactions on Neural Networks and Learning Systems,2014(99):1.
  • 8Zhou Ping,Lu Shaowen,Chai Tianyou.Data-Driven soft- sensor modeling for product quality estimation using case-based reasoning and fuzy-similarity rough sets[J]. IEEE Transactions on Automation Science and Engi- neering,2014,11(4).992-1003.
  • 9Petr K,Ratko G,Bogdan G.Review of adaptation mecha- nisms for data-driven soft sensors[J]. Computers and Chemical Engineering,2011,35(1):1 -24.
  • 10Wang Jianguo,Xiao Qianping, Wang Juanuan,et al.Soft sensor approach for opthnal operation of cooling tower for energy comervation[C]//Proceedoag of The 26th Chinese Control and Decision Conference (2014 CCDC), Changsha, China, May 31-Jtm 2, 2014: 3612- 3615.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部