期刊文献+

基于卷积神经网络的入侵检测研究

Research on Intrusion Detection Based on Convolutional Neural Network
下载PDF
导出
摘要 传统机器学习方法在面对庞大、多维的网上数据时,无法满足入侵检测的准确性和实时性的要求,而大规模的数据刚好为深度学习提供了训练数据,深度学习可以直接从数据中获取高级特征.为此,本文提出一种基于卷积神经网络(Convolutional Neural Network,CNN)的入侵检测方法,首先通过数据的预处理去除了5个对结果影响较小的特征,使得预处理结束后数据集的维度刚好满足卷积神经网络的输入要求,然后通过遗传算法(Genetic Algorithm,GA)对卷积神经网络的权值进行优化,解决了参数调优难的问题.将训练好的模型在KDDCUP99数据集上进行验证,实验结果表明本模型的收敛速度较快,准确率高于98.5%,有重要的研究价值. Traditional machine learning methods cannot meet the accuracy and real-time requirements of intrusion detection when faced with the huge and multi-dimensional online data.The large-scale data provides training data for deep learning,and deep learning can directly obtain advanced features from the data.To this end,an intrusion detection method based on Convolutional Neural Network(CNN)is proposed.First,five features that have little impact on the result are removed through data preprocessing,so that the dimensionality of the data set after the preprocessing is completed just meet the input requirements of the convolutional neural network.After that,the weights of the convolutional neural network are optimized by genetic algorithm(GA),which solves the problem of difficult parameter tuning.The trained model is verified on the KDDCUP99 data set.The experimental results show that the convergence speed of this model is faster and the accuracy rate is higher than 98.5%,which has important research value.
作者 祝蒙蒙 魏明军 ZHU Mengmeng;WEI Mingjun(School of Artificial Intelligence,North China University of Technology,Tangshan Hebei 063210,China)
出处 《信息与电脑》 2020年第22期42-44,共3页 Information & Computer
关键词 入侵检测 卷积神经网络 遗传算法 KDDCUP99数据集 intrusion detection convolutional neural network genetic algorithm KDDCUP99 data set
  • 相关文献

参考文献4

二级参考文献44

  • 1王洁松 张小飞.KDDCutp99网络入侵检测数据的分析和预处理.科技信息,2008,(15):179-182.
  • 2赵新星,姜青山,胡海斌.一种面向网络入侵检测的特征选择方法[J].计算机研究与发展,2009,46(z2):477-482.
  • 3KangZhang.KDDCUP99数据集之背景知识[EB/OL].2010.ht-tp://xifage.com/kdd-cup一99一dataset一1/.
  • 4Hettich S,Bay S D. KDD cup 1999data[ EB/OL]. 1999. http://kdd. ics. uci. edu/databases/kddcup99, html.
  • 5Haines J W,Lippmann R P, Fried D J, et al. Boswell, 1999 DARPA Intrusion Detection Evaluation: Design and Procedures [ C ]. MIT Lin- coln Laboratory: Lexington, MA, 2001.
  • 6陈路莹,姜青山,陈黎飞.一种面向网络入侵检测的特征选择方法[J].计算机研究与发展,2008,45(S):156-160.
  • 7KAVITHA B, KARTHIKEYAN D S, MAYBELL P S. An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier [ J]. Knowledge-Based Systems, 2012, 28(4) : 88 -96.
  • 8MRUTYUNJAYA P, AJITH A, MANAS R P. A hybrid intelligent approach for network intrusion detection [ J]. Procedia Engineering, 2012,30(1): 1 -9.
  • 9HUWAIDA T E, IZZELDIN M O. Alert correlation in collaborative intelligent intrusion detection systems[ J]. Applied Soft Computing, 2011, 11 (7) : 4349 - 4365.
  • 10BENGIO Y. Learning deep architectures for AI[ J]. Foundations and Trends in Machine Learning, 2009,2(1) : 1 - 127.

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部