期刊文献+

神经网络在网络入侵检测中的应用研究 被引量:2

Research on Intrusion Detection System Based on Neural Network
下载PDF
导出
摘要 研究网络安全问题,针对网络受到非法用户入侵,破坏系统的正常工作,传统网络初始权值凭经验确定,易出现初始权值确定不当,导致网络入侵检测准确率低的难题。为了提高网络入侵检测的准确率,提出一种遗传神经网络的网络入侵检测方法。方法把神经网络和遗传算法结合起来,把网络初始权值作为遗传算法的一个种群,把网络检测准确率作为遗传算法的目标函数,通过遗传算法种群的"优胜劣汰"机制搜索到神经网络算法的全局最优初始权值,采用最优权值对网络入侵数据进行检测,得到最优网络入侵检测结果。结果证明,方法学习速度快、检测准确率高、漏报率与误报率低,克服传统网络检测方法不准确的缺陷。 The intrusion detection based on neural network is a common intrusion detection method of intelligence.Weights of standard neural network,are determined by experience,thus the weights may be determined improper ly and cause the neural network run into the local optimal,which results in the problem of low accuracy.In order to improve the accuracy of network intrusion detection,this paper puts forward a intrusion detection methods based on neural network and genetic algorithm network.In the learning process of neural network,using genetic algorithm to optimize neural network weights and then the forecasting model is established.The method is applied in the intrusion detection.simulation and the experiment results with KDD CUP99 are good.It studies fast with high accuracy of categorises rate,network,.
出处 《计算机仿真》 CSCD 北大核心 2010年第12期152-155,共4页 Computer Simulation
关键词 神经网络 入侵检测 遗传算法 Neural network Intrusion detection Genetic algorithm
  • 相关文献

参考文献6

二级参考文献35

  • 1Mitchell T. Machine leaming [M]. NewYork: McGraw-Hill,1997.
  • 2Quinlan J R, Cameron-Jones R M. FOIL: A midterm report [R]. Spring-Verlag: Machine Learning ECML-93, Lecture notes in Computer Science #667, 1993.
  • 3William W Cohen. Fast effective rule induction [C]. Lake Taho, CA: In Machine Learning: the 12th International Conference, 1995.
  • 4MIT Lincoln Labs. 1998 DARPA intrusion detection evaluation [DB/OL]. http:∥www. ll.mit.edu/IST/ideval/index.html.
  • 5Lane T, Brodley C E. An application of machine learning to anomaly detection [C]. Baltimore, MD: Proceedings of the 20th National Information Systems Security Conference,1997. 366-377.
  • 6王士同 陈慧萍 赵跃华 钱旭.人工智能教程[M].北京:电子工业出版社,2002..
  • 7Cohen WW. Fast effective rule induction[A]. Machine Learning- the 12th International Conference[C].Morgan Kaufumann, 1995.
  • 8Taembaum A S. Computer Networks [M]. New York: Prentice Hall Inc, 1996.
  • 9Roesch M, Yarochkin F, Ruiu D. SNORT FAQ Version 1.8[S], 2002.
  • 10Ptacek TH, Newsham TN. Insertion, Evasion, and Denial of Service- Eluding Network Intrusion Detection[Z]. Secure Networks, Inc, 1998.

共引文献202

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部