期刊文献+

面向入侵检测系统的EBP算法研究 被引量:5

The Research of EBP Algorithm for Intrusion Detection System
下载PDF
导出
摘要 BP算法是入侵检测系统(IDS)的一种重要检测方法,但是该算法存在检测时间长、效率低下等局限性.为了解决以上问题,通过对BP算法的深入剖析,提出了一种面向入侵检测系统的新算法——EBP(Enhanced BP)算法.EBP算法通过改进误差函数、增加可自适应放大的误差信号等方法,较好地解决了IDS的检测速度慢、检测效率低下等问题.实验结果表明,EBP算法相比经典的BP算法和MBP算法,不仅在网络训练的收敛速度上有了明显改善,而且在IDS的检测效率上分别提高了14.0%和8.1%,在误报率上分别降低了4.45%和1.5%. Although BP algorithm is a very important method in the intrusion detection systems(IDS),it can cause the system problems of long time detection and low detection rate.To solve these problems,through analyzing the BP algorithm,a novel EBP algorithm(Enhanced BP algorithm)for IDS is constructed.An improved error function is designed in EBP algorithm to solve some disadvantages of the IDS,such as the slower detection speed and detection efficiency.Moreover,a self-adaptive method of magnifying error signal is also proposed.The results show that the EBP algorithm is an efficient algorithm.Compared with the classical BP algorithm and the MBP algorithm,the EBP algorithm can not only increases the convergence speed of network training obviously,but also improves the detection rate of IDS to 14.0% and 8.1%respectively.Besides,the decrease in false positive rate of EBP algorithm is 4.45% and 1.5%than other two algorithms respectively.
作者 马占飞 张涵
出处 《微电子学与计算机》 CSCD 北大核心 2016年第6期117-122,125,共7页 Microelectronics & Computer
基金 国家自然科学基金项目(61163025) 内蒙古自治区自然科学基金项目(2010BS0904) 内蒙古自治区高等学校科学研究基金项目(NJ10162 NJZY14242 NJZY201) 包头市科学研究基金项目(2014S2004-3-1-26)
关键词 EBP算法 神经网络 入侵检测 饱和度 收敛速度 EBP algorithm neural networks intrusion detection saturation degree convergence rate
  • 相关文献

参考文献14

  • 1Luo B, Xia J. A novel intrusion detection system based on feature generation with visualization strategy [J]. Expert Systems with Applications, 2014, 41 (9) :4139-4147.
  • 2Panda M, Abraham A, Patra M R. A hybrid intelli- gent approach for network intrusion detection [J]. Procedia Engineering, 2012, 30(1) : 1-9.
  • 3Liao H J, Richard Lin C H, Lin Y C, et al. Intrusion detection system: A comprehensive review[J]. Jour- nal of Network and Computer Applications, 2013, 36 (1): 16-24.
  • 4杨雅辉,黄海珍,沈晴霓,吴中海,张英.基于增量式GHSOM神经网络模型的入侵检测研究[J].计算机学报,2014,37(5):1216-1224. 被引量:82
  • 5Wang Y, Gu D, Li W, et al. Network intrusion detec- tion with workflow feature definition using bp neural network[M]. Advances in Neural Networks - ISNN 2009. Berlin Heidelberg: Springer, 2009: 60-67.
  • 6Zweiri Y H, Whidborne J F, Seneviratne L D. A three-term backpropagation algorithm[J]. Neurocom- puting, 2003, 50(1): 305-318.
  • 7Wang X G, Tang Z, Tamura H, et al. A modified er- ror function for the backpropagation algorithm [J]. Neurocomputing, 2004, 57(5): 477-484.
  • 8程玥,刘琼荪.一种放大误差信号的BP算法[J].计算机应用研究,2011,28(2):529-531. 被引量:3
  • 9Ng S C, Cheung C C, Leung S H. Magnified gradient function with deterministic weight modification in a- daptive leaming[J]. Neural Networks, IEEE Trans- actions on, 2004, 15(6): 1411-1423.
  • 10Haruhiko T, Hidehiko K, Terumine H. Partially weight minimization approach for fault tolerant multi- layer neural networks[C]//Neural Networks, Pro- eeedings of the 2002 International Joint Conference on. Japan:IEEE, 2002: 1092-1096.

二级参考文献56

共引文献113

同被引文献47

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部