期刊文献+

神经网络在入侵检测中的应用 被引量:4

The Application of Neural Networks In Intrusion Detection
下载PDF
导出
摘要 神经网络具有自组织、自学习和推广能力的优势,将其应用于IDS中是目前网络安全领域的研究热点。基于神经网络的入侵检测方法不仅对于已知的攻击模式具有较好的识别能力,而且具有检测未知攻击的能力。介绍了入侵检测的概念和入侵检测系统的分类,分析了入侵检测技术存在的问题,提出了改进BP算法神经网络的入侵检测模型,最后利用MATLAB验证算法改进的有效性。 The artificial neural network has the capability yourself-organization,self-learning and generalization.Application of neural network in Intrusion Detection System will become the focus of network security research at present.This intrusion detection method which based on neural network can not only identify the known attack,but also can detect the new attack and abnormal event.This article introduced the concept of intrusion detection and intrusion detection system of classification,problems in the analysis of intrusion detection techniques.At the same time,the article Proposed improved BP algorithm of neural network model for intrusion detection,finally using MATLAB validation algorithms to improve effectiveness.
机构地区 金陵科技学院
出处 《计算机安全》 2012年第11期19-23,共5页 Network & Computer Security
基金 2011年校级优秀课程:计算机网络与通信项目编码:40711207
关键词 神经网络 入侵检测 BP算法 MATLAB Neural Network Intrusion Detection BP Algorithm MATLAB
  • 相关文献

参考文献2

  • 1Anderson JP. Computer Security ThreaT Monitoring and Surveillance. Technical P, eport , Contract 79F26400. Fort Washington, Pennsylvania, James P.Anderson Company, 1980.
  • 2王丽娜,董晓梅,于戈,王东.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110. 被引量:20

二级参考文献3

共引文献19

同被引文献28

  • 1马正华,王腾,周炯如.基于BP神经网络的太湖富营养化时空变化预测[J].常州大学学报(自然科学版),2013,25(3):62-65. 被引量:7
  • 2程曦.基于概率神经网络的入侵检测技术[J].计算机辅助工程,2005,14(4):66-70. 被引量:9
  • 3仲勇,薛质.基于免疫的分布式入侵检测模型研究[J].信息安全与通信保密,2007,29(6):206-209. 被引量:2
  • 4Bengio,Yoshua.Learning deep architectures for AI. Foundations and Trends in Machine Learning . 2009
  • 5G. E. Hinton,R. R. Salakhutdin.Reducing the Dimensionality of Data with Neural Networks. Science . 2006
  • 6Le Q V,Ranzato M A,Monga R,et al.Building high-level features using large scale unsupervised learning. IEEE International Conference on Acoustics Speech and Signal Processing Proceedings . 2013
  • 7Andrew Ng,Jiquan Ngiam,Chuan Yu Foo,et al.Deep Learning[OB/OL]. http://deeplearning.stanford.edu/wiki/index.php . 2014
  • 8ANDERSON J P. Computer security threat monitoring and surveil lance[R]. 1980.
  • 9JULISCH K. Mining alarm clusters to improve alarm handing effi ciency[C]. Proceedings 17th Annual Computer Security Applica tions Conference, 2001.
  • 10HUANG GB, ZHOU HM,DING X J,et al. Extreme learning ma- chine for regression and multielass classification[J]. IEEE Trans- actions on Systems Man and Cybernetics Part B-Cybernetics, 2012, 42(2) ..513-529.

引证文献4

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部