Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 335-338.doi: 10.11896/j.issn.1002-137X.2016.6A.080

Previous Articles     Next Articles

Hybrid Intrusion Detection Model Based on Evolutionary Neural Network

QU Hong-chun and WANG Shuai   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to improve the detection rate of the intrusion detection system and reduce the false alarm rate,the misuse detection technology and anomaly detection technology were combined to overcome the single technical defect,and the improved evolutionary neural network was taken as a detection engine.Firstly,the genetic algorithm was improved to overcome the defect of the real-code poor global optimization,reduce the complexity of computation,and improve the speed of genetic algorithm evolutionary convergence.The combination of improved genetic algorithm and BP neural network LM algorithm further overcome the defects of slow training and being easy to fall into local optimum in the learning phase of neural network.Thereby,the capabilities of the neural network classification and pattern recognition increase.Using KDDCUP99 dataset as training and test data sets,experimental results show that the intrusion detection hybrid model based on evolutionary neural network can achieve significant improvement in the extraction speed of data feature rules,detection accuracy and recognizing new types of attacks.

Key words: Intrusion detection,Misuse detection,Anomaly detection,Genetic algorithm,Evolutionary neural network

[1] 阎巧,谢维信.异常检测技术的研究与发展[J].西安电子科技大学学报,2002,29(1):128-132
[2] Raju E,Sravanthi K.Network intrusion detection using Support Vector Machines[J].International Journal of Computer Science And Management Research,2013,2(1):1313-1319
[3] Creech G,Hu J.A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns [J].IEEE Transactions on Computers,2014,63(4):807-819
[4] Shen J,Wang J,Ai H.An Improved Artificial Immune Systembased Network Intrusion Detection by Using Rough Set[J].Communications & Network,2012,4(1):41-47
[5] Lee S C,Heinbuch D V.Training a neural network based intrusion detector to recognize novel attacks[J].IEEE Transactions on Systems Man & Cybernetics Part A Systems & Humans,2001,31(4):294-299
[6] 林冬茂,薛德黔.一种基于无监督免疫优化分层的网络入侵检测算法[J].计算机科学,2013,0(3):180-182
[7] Kim G,Lee S,Kim S.A novel hybrid intrusion detection method integrating anomaly detection with misuse detection[J].Expert Systems with Applications,2014,41(4):1690-1700
[8] Shirazi H M.Anomaly Intrusion Detection System Using Information Theory,K-NN and KMC Algorithms[J].Australian Journal of Basic & AppliedSciences,2009,3(3):2581-2597
[9] Lin S,Ying K,Lee C,et al.An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection [J].Applied Soft Computing,2012,12(10):3285-3290
[10] Ahmad I,Hussain M,Alghamdi A,et al.Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components[J].Neural Computing &Applications,2014,24(78):1671-1682
[11] Gan X S,Duanmu J S,Wang J F,et al.Anomaly intrusion detection based on PLS feature extraction and core vector machine[J].Knowledge-Based Systems,2013,40(1):1-6
[12] 王丽娜,董晓梅,等.基于进化神经网络的入侵检测方法[J].东北大学学报(自然科学版),2002,23(2):107-110
[13] 梁昔明,龙文,秦浩宇,等.基于种群个体可行性的约束优化进化算法[J].控制与决策,2010,5(8):1129-1132
[14] Han F,Liu H.High Dimensional Semiparametric Scale Invariant Principal Component Analysis[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2014,36(10):2016-2032

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!