期刊文献+

改进的BP网络在入侵检测中的应用 被引量:11

Research and Application of Improved Back Propagation Neural Network in Intrusion Detection
下载PDF
导出
摘要 入侵检测是一种积极主动的安全防护技术,不仅能够检测来自外部的入侵行为,同时也监督内部用户的未授权活动,有着非常广泛的应用前景。而人工神经网络是一种基于大量神经元广泛互联的数学模型,具有自学习、自组织、自适应的特点。将神经网络技术和入侵检测技术相结合,建立了一个基于神经网络的入侵检测系统模型并实现了一个基于BP(Back Propagation)神经网络的入侵检测系统的原形,对原有的误差返向传播算法进行了改进以提高收敛速度,然后对一些实际数据进行了测试和分析,在检测率、漏报率、误报率等方面取得了较好的效果。 Intrusion detection is a kind of active voluntary safe protection technique.IDS not only can detect intrusions from the outside,but also can supervise unauthorized users,has a very broad range of applications. Neural network is a mathematical model that has the characteristics of self-study,self-organization and self-adapting.Combined neural network with intrusion detecting technology, it builds the intrusion detection model based on BP algorithm to increase the performance of the original model, and gets good effectiveness.
作者 李钢
机构地区 枣庄学院
出处 《重庆科技学院学报(自然科学版)》 CAS 2010年第1期157-159,162,共4页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
关键词 网络安全 入侵检测 神经网络 network security intrusion detection neural network
  • 相关文献

参考文献6

二级参考文献20

  • 1范华春,王颖,杨彬,李雪莹,陈宇,许榕生.基于网络处理器及协处理器的高速网IDS的研究[J].计算机工程与应用,2005,41(1):124-126. 被引量:5
  • 2CANNADY James.Artificial Neural Networks for Misuse Detection[C].NISSC'98,1998.
  • 3Andrew H S. Identify important features for intrusion detection using support vector machines and neural networks[A]. Proceedings of the 2003 International Symposium on Applications and the Internet Technology[C]. New Jersey:IEEE Computer Society Press, 2003. 209-216.
  • 4Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines[A]. Proceedings of the International Joint Conference on Neural Networks[C]. New Jersey: IEEE Computer Society Press, 2002.1 702-1 707.
  • 5Martin B, Rossouw V S. Utilizing fuzzy logic and trend analysis for effective intrusion detection[J]. Computers and Security, 2003,22(5):423-434.
  • 6Wang Yong, Yang Huihua, Wang Xingyu, et al. Distributed intrusion detection system based on data fusion method [A]. 5th World Congress on Intelligent Control and Automation[C]. New Jersey:IEEE Press, 2004.250-252.
  • 7Matthew V M, Philips K C. An analysis of the 1999 DARPA/Lincoln laboratories evaluation data for network anomaly detection[DB/OL]. http://www, cs.fit.edu/~mmahoney/,2003.
  • 8何倩.[D].桂林:桂林电子工业学院,2003.
  • 9陈田良 王煦法 庄镇泉.遗传算法及其应用[M].北京:人民邮电出版社,1996..
  • 10MartinTH HowardBD MarkB.神经网络设计(英文版)[M].北京:机械出版社、中信出版社,2002..

共引文献20

同被引文献43

引证文献11

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部