期刊文献+

基于改进的深度信念网络的入侵检测方法 被引量:7

Intrusion Detection Method Based on Improved Deep Belief Network
下载PDF
导出
摘要 针对传统入侵检测方法很难快速准确地从海量无标签网络数据中提取特征信息以识别异常入侵,提出了基于改进的深度信念网络的softmax分类(IDBN-SC)入侵检测方法。利用改进的DBN对原始网络数据进行无监督特征学习,引入自适应学习速率减少训练网络模型所需要的时间;采用softmax分类器对获得的降维数据进行网络攻击类型识别。在NSL-KDD数据集上进行测试,相比其他入侵检测方法,实验结果表明IDBN-SC方法不仅识别准确率平均提高3.02%,而且其softmax分类器训练时间平均缩短5.58 s。 In order to solve the problem that the traditional intrusion detection methods are difficult to quickly and accurately extract feature information from massive unlabeled network data to identify abnormal intrusions,this paper proposes an intrusion detection method of Softmax Classification based on the Improved Deep Belief Network(IDBN-SC),where the deep belief network is employed for conducting unsupervised feature learning on the original network data and the adaptive learning rate is used to reduce the time required to train the network model.Moreover,the softmax classifier is utilized to identify the types of network attack.Testing on the NSL-KDD dataset shows that the IDBN-SC method not only improves the recognition accuracy by an average of 3.02%,but also reduces the softmax classifier training time by 5.58 s.
作者 汪盼 宋雪桦 王昌达 陈锋 徐夏强 蔡冠宇 WANG Pan;SONG Xuehua;WANG Changda;CHEN Feng;XU Xiaqiang;CAI Guanyu(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013,China;Joyea Co.,Ltd.,Danyang,Jiangsu 212300,China;Zhenjiang Dantu District Science and Technology Bureau,Zhenjiang,Jiangsu 212000,China)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第20期87-92,共6页 Computer Engineering and Applications
基金 国家重点研发计划(No.2017YFC1600804) 国家自然科学基金(No.61672269)。
关键词 受限玻尔兹曼机 入侵检测 深度信念网络 softmax分类器 自适应学习速率 特征学习 restricted Boltzmann machine intrusion detection deep belief network softmax classifier adaptive learning rate feature learning
  • 相关文献

参考文献8

二级参考文献30

  • 1车万翔,刘挺,李生.实体关系自动抽取[J].中文信息学报,2005,19(2):1-6. 被引量:115
  • 2王华忠,俞金寿.核函数方法及其模型选择[J].江南大学学报(自然科学版),2006,5(4):500-504. 被引量:40
  • 3董静,孙乐,冯元勇,黄瑞红.中文实体关系抽取中的特征选择研究[J].中文信息学报,2007,21(4):80-85. 被引量:55
  • 4[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 5[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 6[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 7[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 8[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 9[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 10刘克彬,李芳,刘磊,韩颖.基于核函数中文关系自动抽取系统的实现[J].计算机研究与发展,2007,44(8):1406-1411. 被引量:58

共引文献261

同被引文献67

引证文献7

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部