期刊文献+

BP神经网络智能入侵检测系统设计 被引量:2

Design for Intelligent Intrusion Detection System Based on Back Propagation Neural Network
下载PDF
导出
摘要 为了解决传统静态安全技术缺乏对入侵进行主动检测的机制,而且在使用过程中需要人工实施和维护,难以满足当前网络安全要求的问题;一种针对误差信号函数和学习规则进行改进的BP算法在分析标准BP算法存在的问题和其原因的基础上被提出;采用该改进算法构建了一种结合误用检测和异常检测技术的基于BP神经网络的智能入侵检测系统模型;仿真实验结果表明与标准BP算法相比,该改进算法具有学习过程快的优点,并且该系统具有较高的检测正确率并能检测出新的未知的攻击模式。 Aiming at solving the problems existing in the conventional network security techniques,which lack the active intrusion detection mechanism and need manual work to implement and maintain and which has been unable to meet the higher safety requirements of the present network,on the basis of analysis of the standard back propagation algorithm,a BP improved algorithm which adjusts the error signal function and method of training is proposed.By using of the improved algorithm,a detailed design scheme of intrusion detection model based on BP neural network which combines misuse detection technique with anomaly detection technique and which is made up of six modules is put forward.Experiment results showed that comparing with the standard BP algorithm,this improved algorithm has the advantages of faster learning progress and this intrusion detection system can recognize the unknown attacks and has good recognizing ability to the known attacks.
出处 《重庆工商大学学报(自然科学版)》 2010年第4期355-359,共5页 Journal of Chongqing Technology and Business University:Natural Science Edition
关键词 网络安全 入侵检测 BP神经网络 BP改进算法 network security intrusion detection Back Propagation Neural Network BP improved algorithm
  • 相关文献

参考文献15

  • 1国家计算机病毒应急处理中心.2008年全国信息网络安全状况与计算机病毒疫情调查分析报告[R].[2008-10].http://www.antivirus-china.org.cn/head/diaocha2008/report1.ppt.
  • 2金山毒霸.2008年中国电脑病毒疫情及互联网安全报告[R].[2009-02].http://news.duba.net/contents/2009-02/05/6235.html.
  • 3AJITH A, RAVI J, JOHNSON T. D-SCIDS: Distributed soft computing intrusion detection system [ J ]. Journal of Network and Computer Applications, 2007,30 : 81-98.
  • 4ABRAHAM A, JAIN R, SANYAL S. SCIDS: a soft computing intrusion detection system [ C ]. Sixth international workshop on distributed computing (IWDC 2004). Lecture Notes in Computer Science, Germany, Springer, 2004,26:252-257.
  • 5SHAH K, DAVE N, CHAVAN S. Adaptive Neuro-Fuzzy Intrusion Detection System [ C ]. IEEE International Conference on Information Technology: Coding and Computing (ITCC'04), USA, IEEE Computer Society, 2004( 1 ) :70-74.
  • 6MUKKAMALA S, SUNG H, ABRAHAM A. Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach [C]. The 17th International Conference on Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, Innovations in Applied Artificial Intelligence, Robert Orchard, Chunsheng Yang, Moonis Ali ( Eds. ), Lecture Notes in Computer Science 3029, Springer Verlag, Germany, 2004:633-642.
  • 7MUKKAMALA S, SUNG H, ABRAHAM A. Intrusion Detection Systems Using Adaptive Regression Splines [ C ]. 6th International Conference on Enterprise Information Systems, ICEIS' 04, Portugal, I Seruca, J Filipe, S Hammoudi and J Cordeiro (Eds.), 2004(3) :26-33.
  • 8ABRAHAM A. Evolutionary computation in intelligent web management, evolutionary computing in data mining [ C ]. In Ghosh A, Lakhmi J, editors. Studies in fuzziness and soft computing. Germany, Springer, 2004:189-210.
  • 9ABRAHAM A, THOMAS J. Distributed intrusion detection systems: a computational intelligence approach[ C ]. In Abbass HA, Essam D, editors. Applications of information systems to homeland security and defense. USA: Idea Group Inc. Publishers, 2005 : 105-135.
  • 10CHEBROLU S, ABRAHAM A, THOMAS J. Feature deduction and ensemble design of intrusion detection systems [ C ]. computers and securitv. Amsterdam. Elsevier. 2005 (4) :295-307.

共引文献2

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部