Intrusion detection method based on fast k-nearest neighbor (KNN) algorithm

A KNN algorithm and intrusion detection technology, applied to electrical components, transmission systems, etc., can solve problems such as small improvement space

Active Publication Date: 2014-03-05
EAST CHINA UNIV OF SCI & TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is still a lot of room for improvement in the existing various intrusion detection algorithms, both in terms of detection capabilities and detection efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method based on fast k-nearest neighbor (KNN) algorithm
  • Intrusion detection method based on fast k-nearest neighbor (KNN) algorithm
  • Intrusion detection method based on fast k-nearest neighbor (KNN) algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0056] Such as figure 1 As shown, an intrusion detection method based on the fast KNN algorithm includes the following steps:

[0057] The data preprocessing step is to receive the intrusion detection raw data, and perform data preprocessing on the raw data, including continuous data discretization processing and character data digitization processing, and the data preprocessing method adopts a common method in the prior art;

[0058] In the feature reduction step, a feature reduction algorithm based on mutual information is used to perform feature reduction on the preprocessed data;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an intrusion detection method based on a fast k-nearest neighbor (KNN) algorithm. The method comprises the following steps: carrying out data pretreatment; receiving original data of intrusion detection; carrying out data pretreatment on the original data, wherein data pretreatment includes continuous data discretization treatment and character data digitalization treatment; reducing features; carrying out feature reduction on the pretreated data by adopting a mutual information-based feature reduction algorithm; detecting in a classified manner; carrying out classified detection on the data after feature reduction by adopting the fast KNN algorithm, and outputting the classified result. Compared with the prior art, the intrusion detection method has the advantages of high classification effectiveness, high classification accuracy and the like.

Description

technical field [0001] The invention relates to a network intrusion detection technology, in particular to an intrusion detection method based on a fast KNN algorithm. Background technique [0002] With the complexity, diversification and intelligence of various computer network attack methods, the problem of network information security has become increasingly prominent. Destruction of the terminal operating system, illegal theft of personal data, bank account passwords, and illegal intrusion into system databases, etc., have seriously hindered the normal use of the Internet and caused great harm to society and individuals. Therefore, building a network information security system is an essential technical support for the effective use of the Internet. Generally speaking, a network information security system includes four steps: protection, detection, reaction, and recovery. The detection is to discover network behaviors beyond the scope of the system security policy, whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张雪芹曹庆顾春华
Owner EAST CHINA UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products