期刊文献+

基于NDNN的入侵检测系统 被引量:7

Application of Deep Learning in New Intrusion Detection System
下载PDF
导出
摘要 本文设计了一种新的深度神经网络(New Deep Neural Network,NDNN)模型,并将其应用到入侵检测系统中.NDNN以其突出的特征学习能力充分学习训练数据的特征,在输出层,NDNN通过Softmax分类器对网络攻击报文与正常报文数据进行识别和分类,检测异常报文与入侵攻击.实验通过对KDD Cup 99数据集进行仿真,实验结果表明本文设计的基于NDNN的入侵检测系统模型,进一步提高了入侵检测系统的精度,增强了网络的安全性. We design a New Deep Neural Network (NDNN) model and apply it to the intrusion detection system, which is based on the feature learning experiment of the deep structure. NDNN has an outstanding characteristics of learning ability, so it can fully study the characteristics from the training data. In the output layer, NDNN identify and classify the attack and normal messages and detect intrusion attacks through the Softmax classifier. Through the simulation experiment in the KDD Cup 99 data set, this paper designs a intrusion detection system model NDNN which further improve the accuracy of the intrusion detection system and enhance the security of the network.
作者 王萌 王亚刚 韩俊刚 WANG Meng;WANG Ya-gang;HAN Jun-gang(School of Computer Science, Xian University of Posts and telecommunications, Xi'an 710121, China)
出处 《微电子学与计算机》 CSCD 北大核心 2018年第7期83-86,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(61136002) 陕西省教育厅科研计划项目(14JK1674) 西安邮电大学研究生创新基金项目(103-602080010)
关键词 深度神经网络 入侵检测 KDD CUP 99 NDNN intrusion detection KDD Cup 99
  • 相关文献

参考文献2

二级参考文献58

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献236

同被引文献50

引证文献7

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部