期刊文献+

改进蚁群算法优化支持向量机的网络入侵检测 被引量:14

Network Intrusion Detection Model Based on Support Vector Machine and Improved and Colony Optimiza Tion Algorithm
下载PDF
导出
摘要 针对支持向量机参数优化问题,为了提高网络入侵检测率,提出一种变异蚁群算法优化支持向量机的网络入侵检测模型(MACO-SVM)。首先采用蚁群搜索路径节点代表支持向量机参数,并将网络入侵检测率为目标函数,然后通过蚁群算法的全局寻优能力和反馈机制寻找最优参数,并对蚂蚁进行高斯变异,克服蚁群陷入局部极值,最后将最优路径上的节点连接起来得到SVM的最优参数,建立最优网络入侵检测模型。采用KDD99数据集对模型进行仿真实验,仿真结果表明,MACO-SVM的网络入侵检测速度要快于其它网络入侵检测模型,而且提高了网络入侵检测率。 In order to solve parameters optimization problem for support vector machine in network intrusion detection,this paper proposed a network intrusion detection model based on support vector machine,whose parameters were optimized by the improved ant colony optimization algorithm.Firstly,the node of ant colony search path represented the parameters of support vector machine,network intrusion detection rate was taken as the goal function,and then global optimization and feedback mechanism of ant colony optimization algorithm were used to find the optimal path,and Gauss mutation was introduced to overcome local minima,and the nodes of the optimal path were connected to form the optimal parameters of support vector machine and to establish the optimal network intrusion detection model,and the simulation experiments were carried out on the KDD99 dataset.The simulation results show that the proposed model not only accelerates network intrusion detection rate,but also improves intrusion detection rate,compared with reference models.
出处 《计算技术与自动化》 2015年第2期95-99,共5页 Computing Technology and Automation
基金 国家自然科学基金资助项目(60874070) 广东省教育厅项目(2010tjk446)
关键词 网络入侵 蚁群优化算法 支持向量机 参数优化 intrusion detection ant colony optimization algorithm support vector machine parameters optimization
  • 相关文献

参考文献12

二级参考文献46

共引文献129

同被引文献108

  • 1王福忠,姚波,张嗣瀛.线性系统区域稳定的可靠控制[J].控制理论与应用,2004,21(5):835-839. 被引量:61
  • 2姚波,王福忠,张庆灵.基于LMI可靠跟踪控制器设计[J].自动化学报,2004,30(6):863-871. 被引量:33
  • 3Patel R, Thakkar A, Uanatra A. A survey and comparative analysis of data mining techniques for network intrusion detection systems. International Journal of Soft Computing Engineering, 2012, 2(1): 78-85.
  • 4Dong Y, Qi B, Zhu W, et al. A new intrusion detection model based on data mining and neural network. Przeglad Elektrotechniczny, 2013, 89(1b): 88-90.
  • 5Denning DE. An intrusion detection model. IEEE Trans. on Software Engineering, 2010, 13(2): 222-232.
  • 6Pan W, Shen XT, Liu BH. Cluster analysis unsupervised learning via supervised learning with a non convex penalty. Journal of Machine Learning Research, 2013: 1865-1889.
  • 7Wang B, Shi Y, Huang WW, et al. Misclassification minimization based on multiple criteria linear programming. Proc. of 2014 IEEE Int Conl on Data Mining Workshop, Piscataway, NJ. IEEE. 2014. 88-92.
  • 8Venkatesan R, Uanesan R, Selvakumar AAI. A comprehensive study in data mining frameworks for intrusion detection . International Journal 01 Advanced Computer Research, 2012, 2(7): 29-34.
  • 9严岳松,倪桂强,缪志敏,潘志松,汪肇强.基于SVDD的半监督入侵检测研究[J].微电子学与计算机,2009,26(10):128-130. 被引量:6
  • 10刘炜.应用改进最小距离分类法识别泵功图工况[J].电脑知识与技术,2010(02X):1449-1451. 被引量:2

引证文献14

二级引证文献153

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部