期刊文献+

面向入侵检测的Taylor神经网络构建与分析

Construction and Analysis of Taylor Neural Network for Intrusion Detection
下载PDF
导出
摘要 深度学习方法已成为网络入侵检测的重要手段,但现有深度学习模型无法挖掘出网络入侵数据特征值间隐藏的函数映射关系。对此,设计了Taylor神经网络模型(TNN)。利用Taylor公式对多项式函数的逼近能力与神经网络的优化能力对入侵数据特征间的关系进行挖掘与利用。首先,介绍Taylor神经网络的基本结构。为了将Taylor神经网络引入入侵检测领域,设计了Taylor神经网络层(TNL),并将其与传统深度神经网络结合构建Taylor神经网络模型。为优化Taylor公式的展开项数,引入人工蜂群算法,但传统的人工蜂群算法存在开采能力较差,易陷入“早熟”等问题,因此设计了一种基于高斯过程的人工蜂群算法。实验结果表明,基于Taylor神经网络的入侵检测算法在NSL-KDD和UNSW-NB15数据集上的准确率具有明显优势。 Deep learning methods have become an important means of network intrusion detection,but the existing deep learning models cannot dig out the hidden function mapping relationships among the characteristic values of network intrusion data.In this regard,this paper designs a Taylor neural network model(TNN).The Taylor formula is used to mine and utilize the relationship between the polynomial function approximation ability and the neural network optimization ability.Firstly,this paper introduces the basic structure of Taylor neural network.In order to introduce the Taylor neural network into the field of intrusion detection,the Taylor neural network layer(TNL)is designed and combined with the traditional deep neural network to build the Taylor neural network model.In order to optimize the number of expansion terms of Taylor formula,artificial bee colony algorithm is introduced,but the traditional artificial bee colony algorithm has problems such as poor mining ability and easy to fall into“premature”.An artificial bee colony algorithm based on Gaussian process is designed.Experimental results show that the accuracy of intrusion detection algorithm based on Taylor neural network has obvious advantages on NSLKDD and UNSW-NB15 datasets.
作者 王振东 张林 杨书新 王俊岭 李大海 WANG Zhendong;ZHANG Lin;YANG Shuxin;WANG Junling;LI Dahai(School of Information Engineering,Jiangxi University of Science and Technology,Ganzhou,Jiangxi 341000,China)
出处 《计算机科学与探索》 CSCD 北大核心 2023年第3期748-760,共13页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金(62062037,61763017) 江西省自然科学基金(20181BBE58018)。
关键词 网络安全 入侵检测 TAYLOR公式 神经网络 人工蜂群算法 network security intrusion detection Taylor formula neural network artificial bee colony algorithm
  • 相关文献

参考文献4

二级参考文献15

  • 1何慧,苏一丹,覃华.基于信息增益的贝叶斯入侵检测模型优化的研究[J].计算机工程与科学,2006,28(6):38-40. 被引量:9
  • 2HAN J W,KAMBER M.数据挖掘概念与技术[M].范明,孟小峰,译.北京:机械工业出版社,2000.
  • 3Krontiris I,Benenson Z,Giannetsos T,et al.Cooperative intrusion detection in wireless sensor networks[C]//LNCS 5432:Proceedings of EWSN 2009,2009:263-278.
  • 4Lee W,Stolfo S J,Chan P K.Real time data miningbased intrusion detection[C]//Proceedings of the DARPA Information Survivability Conference and Exposition II(DISCEXII).Anaheim,CA:IEEE Computer Society,2001:85-100.
  • 5Patcha A,Park J.An overview of anomaly detection techniques:existing solutions and latest technological trends[J].Compute Networks,2007,51(12):3448-3470.
  • 6Harry Z,Sheng S L.Learning Weighted Naive Bayes with accurate ranking[C]//Proceedings of the 4th IEEE International Conference on Data Mining(ICDM 04),Brighton,UK,2004:567-570.
  • 7Pawlak Z.Rough sets[J].International Journal of Parallel Programming,1982,11(5):341-356.
  • 8Kennedy J,Eberhart R C.Particle swarm optimization[C]//Proceedings of the IEEE International Conference on Neural Networks.Piscataway,NJ:IEEE Service Center,1995:1942-1948.
  • 9Information and Computer Science University of California.Irving KDD Cup 1999 data[EB/OL].(2010-09-20)[2014-04-30].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  • 10全亮亮,吴卫东.基于支持向量机和贝叶斯分类的异常检测模型[J].计算机应用,2012,32(6):1632-1635. 被引量:7

共引文献222

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部