期刊文献+

面向入侵检测系统的Deep Belief Nets模型 被引量:23

Deep belief nets model oriented to intrusion detection system
下载PDF
导出
摘要 连续的网络流量会导致海量数据问题,这为入侵检测提出了新的挑战。为此,提出一种面向入侵检测系统的深度信念网络(deep belief nets oriented to the intrusion detection system,DBN-IDS)模型。首先,通过无监督的、贪婪的算法自底向上逐层训练每一个受限玻尔兹曼机(restricted Boltzmann machine,RBM)网络,使得大量高维、非线性的无标签数据映射为最优的低维表示;然后利用带标签数据被附加到顶层,通过反向传播(back propagation,BP)算法自顶向下有监督地对RBM网络输出的低维表示进行分类,并同时对RBM网络进行微调;最后,利用NSLKDD数据集对模型参数和性能进行了深入的分析。实验结果表明,DBN-IDS分类效果优于支持向量机(support vector machine,SVM)和神经网络(neural network,NN),适用于高维、非线性的海量入侵数据的分类处理。 It puts forward a new challenge with intrusion detection, the continuous collection of traffic databy the network leads to the massive data problems. Therefore, a deep belief nets model oriented to the intrusiondetection system (DBN-IDS) is proposed. First, an unsupervised, greedy algorithm is employed to train eachrestricted Boltzmann machine (RBM) at a time by a bottom-up approach, which makes large amounts of nonlinearhigh-dimensional unlabeled input data can be sampled as optimal low-dimensional feature representations.Second, using the labeled data at the top layer, the supervised back propagation (BP) algorithm is employed inclassifying the learned low-dimensional representations and fine-tuning the RBM network simultaneously. Theparameters and the performance of the model are deeply analyzed on NSL-KDD dataset. Experimental resultsdemonstrate that the DBN-IDS outperforms the support vector machine (SVM) and neural network (NN) , andwhich is a feasible approach in intrusion classification for the high-dimensional, nonlinear and large-scale data.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2016年第9期2201-2207,共7页 Systems Engineering and Electronics
基金 国家自然科学基金(61373176 61572401)资助课题
关键词 入侵检测 神经网络 深度信念网络 intrusion detection neural network (NN) deep belief nets
  • 相关文献

参考文献1

二级参考文献16

  • 1俞研,黄皓.基于改进多目标遗传算法的入侵检测集成方法(英文)[J].软件学报,2007,18(6):1369-1378. 被引量:21
  • 2Chen J Y, Yang D Y, Matsumoto N. A study of detector gener ation algorithms based on artificial immune in intrusion detection system[J]. WSEAS Trans. on Biology and Biomedicine,2007, 3(4) : 29 - 35.
  • 3Iren L F, Francisco M P, Francisco J G, et al. Intrusion detec-tion method using neural networks based on the reduction of characteristics[C]//Proc, of the lOth International Work-Con- ference on Aarti fical Neural Networks, 2009 : 1296 - 1303.
  • 4Xie L X, Zhu D, Yang H Y. Research on SVM based network intrusion detection elassifieation[C]// Proc. of the 6th Interna tional Conference on Fuzzy Systems and Knowledge Discovery, 2009: 362 - 366.
  • 5Yi Y, Wu J S, Xu W. Incremental SVM based on reserved set for network intrusion detection[J]. Expert Systems with Appli cations, 2011,38(6) : 7698 -7707.
  • 6Latifur K, Mamoun A, Bhavani T. A new intrusion detection system using support vector machines and hierarchical clustering [J]. The International Journal on Very Large Data Bases, 2007,16(4): 507-521.
  • 7Zhao Z Y, Zhong P, Zhao Y H. Learning SVM with weighted maximum margin criterion for classification of imbalanced data [J]. Mathematical and Computer Modelling, 2011, 54(3 - 4) : 1093 - 1099.
  • 8Han H, Wang W, Mao B. Borderline smote: a new over-sam- pling method in imbalaneed data sets learning[C]//Proc, of the International Conference on Intelligent Computing, 2005 878 - 887.
  • 9Liu Y, Yu X H, Huang X J. Combining integrated sampling with SVM ensembles for learning from imbalanced datasets[J]. Information Processing and Management, 2011, 47(4): 617 - 631.
  • 10Sun Y, Kamela M, Wongb A. Cost sensitive boosting for clas sification of imbalaneed data[J]. Pattern Recognition, 2007, 40 (12): 3358 - 3378.

共引文献11

同被引文献109

引证文献23

二级引证文献192

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部