计算机科学 ›› 2016, Vol. 43 ›› Issue (Z6): 335-338.doi: 10.11896/j.issn.1002-137X.2016.6A.080

• 信息安全 • 上一篇    下一篇

一种基于进化神经网络的混合入侵检测模型

屈洪春,王帅   

  1. 重庆邮电大学工业物联网及网络化控制教育部重点实验室 重庆400065,重庆邮电大学工业物联网及网络化控制教育部重点实验室 重庆400065
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受中-韩美工业物联网国际联合研发中心,重庆市科技研发基地建设计划(国际科技合作)项目(cstc2013gjhz40002),重庆市基础与前沿研究计划项目(cstc2013jcyjA40014)资助

Hybrid Intrusion Detection Model Based on Evolutionary Neural Network

QU Hong-chun and WANG Shuai   

  • Online:2018-11-14 Published:2018-11-14

摘要: 为了提高入侵检测系统的检测率并降低误报率,将误用检测技术和异常检测技术进行结合,以克服采用单一技术的缺陷。采用改进的进化神经网络作为检测引擎,首先,通过对遗传算法进行改进,弥补实数编码全局寻优能力差的缺陷,且降低计算的复杂度,提高进化收敛速度;然后,将改进的遗传算法和BP神经网络的LM算法进行结合,进一步克服神经网络学习阶段训练速度慢和易陷入局部最优的缺点,进而提高神经网络的分类能力和模式识别能力。采用 KDDCUP99数据集作为训练与测试数据集进行实验,结果表明,基于改进的进化神经网络建立的混合入侵检测模型在数据特征规则的提取速度、检测精度以及识别新的攻击类型方面有明显改善。

关键词: 入侵检测,误用检测,异常检测,遗传算法,进化神经网络

Abstract: In order to improve the detection rate of the intrusion detection system and reduce the false alarm rate,the misuse detection technology and anomaly detection technology were combined to overcome the single technical defect,and the improved evolutionary neural network was taken as a detection engine.Firstly,the genetic algorithm was improved to overcome the defect of the real-code poor global optimization,reduce the complexity of computation,and improve the speed of genetic algorithm evolutionary convergence.The combination of improved genetic algorithm and BP neural network LM algorithm further overcome the defects of slow training and being easy to fall into local optimum in the learning phase of neural network.Thereby,the capabilities of the neural network classification and pattern recognition increase.Using KDDCUP99 dataset as training and test data sets,experimental results show that the intrusion detection hybrid model based on evolutionary neural network can achieve significant improvement in the extraction speed of data feature rules,detection accuracy and recognizing new types of attacks.

Key words: Intrusion detection,Misuse detection,Anomaly detection,Genetic algorithm,Evolutionary neural network

[1] 阎巧,谢维信.异常检测技术的研究与发展[J].西安电子科技大学学报,2002,29(1):128-132
[2] Raju E,Sravanthi K.Network intrusion detection using Support Vector Machines[J].International Journal of Computer Science And Management Research,2013,2(1):1313-1319
[3] Creech G,Hu J.A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns [J].IEEE Transactions on Computers,2014,63(4):807-819
[4] Shen J,Wang J,Ai H.An Improved Artificial Immune Systembased Network Intrusion Detection by Using Rough Set[J].Communications & Network,2012,4(1):41-47
[5] Lee S C,Heinbuch D V.Training a neural network based intrusion detector to recognize novel attacks[J].IEEE Transactions on Systems Man & Cybernetics Part A Systems & Humans,2001,31(4):294-299
[6] 林冬茂,薛德黔.一种基于无监督免疫优化分层的网络入侵检测算法[J].计算机科学,2013,0(3):180-182
[7] Kim G,Lee S,Kim S.A novel hybrid intrusion detection method integrating anomaly detection with misuse detection[J].Expert Systems with Applications,2014,41(4):1690-1700
[8] Shirazi H M.Anomaly Intrusion Detection System Using Information Theory,K-NN and KMC Algorithms[J].Australian Journal of Basic & AppliedSciences,2009,3(3):2581-2597
[9] Lin S,Ying K,Lee C,et al.An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection [J].Applied Soft Computing,2012,12(10):3285-3290
[10] Ahmad I,Hussain M,Alghamdi A,et al.Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components[J].Neural Computing &Applications,2014,24(78):1671-1682
[11] Gan X S,Duanmu J S,Wang J F,et al.Anomaly intrusion detection based on PLS feature extraction and core vector machine[J].Knowledge-Based Systems,2013,40(1):1-6
[12] 王丽娜,董晓梅,等.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110
[13] 梁昔明,龙文,秦浩宇,等.基于种群个体可行性的约束优化进化算法[J].控制与决策,2010,5(8):1129-1132
[14] Han F,Liu H.High Dimensional Semiparametric Scale Invariant Principal Component Analysis[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2014,36(10):2016-2032

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!