期刊文献+

基于DBN-KELM的入侵检测算法 被引量:9

Intrusion Detection Algorithm Based on DBN-KELM
下载PDF
导出
摘要 传统机器学习算法需要人工构建样本特征,处理海量多源异构网络入侵数据时分类效果较差。针对该问题,结合深度信念网络(DBN)和核极限学习机(KELM),提出一种混合深度学习入侵检测算法DBN-KELM。利用DBN提取高维网络历史数据的抽象特征,获得原始数据的低维表示形式。在此基础上,通过KELM对低维表示的数据做监督学习,达到准确识别网络攻击的目的。在NSL-KDD数据集上进行仿真,实验结果表明,DBN-KELM算法能够提高分类准确率,降低对小样本攻击的误报率,同时缩短分类器的训练时间。 Traditional machine lesming algorithms need to construct sample features manually,which have poor clasification efectwhen dealing with ma sive multi-source intrusion datain heterogeneous network.To solve this problem,a hybrid deep lesrning intrusion detection algorithm is proposed combing Deep BelieC Network(DBN)with Kernel Extreme Learning Machine(KELM),which is named DBN-KELM.It uses DBN to extract the abstract features of high historical data in dimensional network,so as to obtain the low dimensional representlion form of the original data.On this basis,O uses KELM to do supervised learning for low dimensional data to accurately identify the network attack.Simultions9rec9ried outon theNSL-KDD d9tset,9nd theexperimentlresultsshow th9t,DBN-KELM 9lgorithm c9n improve the 9ccur9cy of cl ssific9tion,reducethef9lse9lrm r9te of sm9l s9mple 9tcks 9nd shorten the tr9ining timeof thecl sifier.
作者 汪洋 伍忠东 火忠彩 WANG Yang;WU Zhongdong;HUO Zhongcai(School of Electronic and Information Engineering,Lanzhou Jiaotong University,Lanzhou 730070,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第10期171-175,182,共6页 Computer Engineering
基金 甘肃省高等学校创新团队项目(2017C-09) 兰州市科技局科技项目(2018-1-51)
关键词 深度学习 深度信念网络 特征提取 核极限学习机 入侵检测 deep learning Deep Belief Network(DBN) feature extraction Kernel Extreme Learning Machine(KELM) intrusion detection
  • 相关文献

参考文献4

二级参考文献46

  • 1Müller K R,Mika S,Ratsch G,et al.An introduction to kernel-based learning algorithms[J].IEEE Transactions on Neural Networks,2001,12(2):181-202.
  • 2Cristianini N,Shawe-Taylor J.Kernel Methods for Pattern Recognition[M].Cambridge:Cambridge University Press,2004.
  • 3Suykens J A K.Nonlinear modeling and support vector machine[C]/ / IEEE Instrumentation and Measurement Technology Conference Budapest.Hungary:[s.n.],2001:21-23.
  • 4Suykens J A K,Vandewalle J.Least squares support vector machine classifiers[J].Neural Processing Letters,1999,9(3):293-300.
  • 5Mika S,Ratsch G,Weston B,et al.Fisher discriminant analysis with kernels.Neural Networks for Signal Processing IX[C].New York:IEEE Press,1999:41-48.
  • 6Zien A,Ratsch C C,Mike S,et al.Engineering support vector machine kernels that recognize translation initiation sites in DNA[J].Bioinformatics,2000,16:799-807.
  • 7Aizerman M,Braverman,Rozonoer L.Theoretical foundations of the potential function method in pattern recognition learning[J].Automation and Remote Control,1964,25:821-837.
  • 8Vapnik V N.The Nature of Statistical Learning Theory[M].NY:Springer-Verlag,1995.
  • 9Drucker H,Burges C J C,Kaufman L,et al.Support vector regression machines[C]/ / Mozer M,Jordan M,Petsche T.Advances in Neural Information Processing Systems.Cambridge:MIT Press,1997:155-161.
  • 10Suykens J K A,Gestel T V,Brabanter J D,et al.Least Squares Support Vector Machines[M].Singapore:World Scientific Publishing Co Pte Ltd,2002.

共引文献67

同被引文献70

引证文献9

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部