期刊文献+

基于人工神经网络和遗传算法的网络攻击检测 被引量:16

Network attack detection based on artificial neural networks and genetic algorithm
在线阅读 下载PDF
导出
摘要 针对网络攻击检测准确率较低的问题,提出基于人工神经网络和遗传算法的混合网络攻击检测算法。将多目标遗传算法和多项式逻辑回归模型组合成封装特征选择算法,利用多项式回归模型对多分类数据的高效学习能力以及多目标遗传算法的全局优化能力,提取数据的最优特征子集;将降维后的特征集送入感知机训练,利用重引力搜索算法搜索神经网络的参数。基于不同的网络数据集完成实验,实验结果表明,该算法有效降低了特征维度,实现了较好的检测性能。 Aiming at the problem of low network attack detection accuracy,a hybrid network attack detection algorithm based on artificial neural networks and genetic algorithm was proposed.The multiple objective genetic algorithm and the multinomial logistic regression model were combined as a wrapper feature selection algorithm,the efficient learning capacity of the multinomial logistic regression model and global optimization capacity of the multiple objective genetic algorithm were utilized,and the optimal feature subset was achieved.The dimension reduced feature sets were delivered into perceptron to train,the gravitational search algorithm was adopted to search the parameters of neural networks.Experiments were carried out on different datasets,results show that the proposed algorithm reduces feature dimension effectively,and it also achieves good detection performance.
作者 罗予东 陆璐 LUO Yu-dong;LU Lu(School of Computer Technology,Jiaying University,Meizhou 514015,China;School of Computer Science and Engineering,South China University of Technology,Guangzhou 510641,China)
出处 《计算机工程与设计》 北大核心 2021年第9期2446-2454,共9页 Computer Engineering and Design
基金 国家自然科学基金青年基金项目(61402178)。
关键词 网络安全 入侵检测 特征选择 多项式逻辑回归 不平衡数据分类 多层感知机 networks security intrusion detection feature selection multinomial logistic regression imbalanced data classification multi-layer perceptron
  • 相关文献

参考文献8

二级参考文献48

  • 1张丽新,王家钦,赵雁南,杨泽红.机器学习中的特征选择[J].计算机科学,2004,31(11):180-184. 被引量:18
  • 2王皓,孙宏斌,张伯明.PG-HMI:一种基于互信息的特征选择方法[J].模式识别与人工智能,2007,20(1):55-63. 被引量:6
  • 3张卷美.一种新的迭代收敛阶数的证明与推广[J].大学数学,2007,23(6):135-139. 被引量:4
  • 4国家互联网应急中心.2013年我国互联网网络安全态势综述[J/OL].http://www.cert. org.cn.
  • 5ANDERSO J P. Computer Security Threat Monitoring and Surveil-lance [P]. USA: PA 19034,1980.4.
  • 6LI M. An approach to reliably identifying signs ofDDOS flood attacksbased on LRD traffic pattern recognition[Jj. Computers & Security,2004,23(7):549-558.
  • 7DEREK. S, GUAN Q, FU S. An anomaly detection framework forautonomic management of compute cloud systems[C]//ComputerSoftware and Applications Conference Workshops (COMPSACW).Seoul, c2010: 376-381.
  • 8GUAN Q, ZHANG Z M, FU S. Ensemble of Bayesian predictors anddecision trees for proactive failure management in cloud computingsystems[J]. Journal of Communications, 2012,7(1):52-61.
  • 9HUSANBIR S, LIU J G, GUAN Q. AFD: adaptive failure detectionsystem for cloud computing infrastructures[C]//Perrormance Computingand Communications Conference (IPCCC). Austin, TX, c2012: 71-80.
  • 10ZHU Q, TERESA T, XTE Q. Automatic fault diagnosis in cloud infra-slnicture[C]//Cloud Computing Technology and Science(CloudCom).Bristol, c2013: 467-474.

共引文献247

同被引文献166

引证文献16

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部