Intrusion detection method and system of BP algorithm based on artificial swarm optimization

A technology of artificial bee colony optimization and BP algorithm, applied in the intrusion detection method of BP algorithm and its system field, can solve problems such as easy to fall into local minimum point, slow convergence speed of BP neural network, and large amount of calculation

Active Publication Date: 2018-07-06
HUNAN UNIV OF SCI & ENG
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The object of the present invention is to provide a kind of intrusion detection method based on the BP algorithm of artificial bee colony optimization and its system, in order to solve the problems of slow convergence speed, easy to fall into local minimum point and large amount of calculation in the existing BP neural network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and system of BP algorithm based on artificial swarm optimization
  • Intrusion detection method and system of BP algorithm based on artificial swarm optimization
  • Intrusion detection method and system of BP algorithm based on artificial swarm optimization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Such as figure 1 Shown, a kind of intrusion detection method based on artificial bee colony optimization BP algorithm, this method comprises the following steps:

[0077] S101. Collect host log files and network data of the computer network system including the status and behavior of the system, network, data and user activities;

[0078] The network system information used by intrusion detection generally comes from the following four aspects:

[0079] First, system and network log files

[0080] Hackers often leave their traces in system log files, so making full use of system and network log file information is a necessary condition for intrusion detection. Logs contain evidence of unusual and unexpected activity on systems and networks that can indicate that someone is breaking into or has successfully broken into a system. By viewing log files, successful intrusions or intrusion attempts can be found, and corresponding emergency response procedures can be activa...

Embodiment 2

[0137] Based on the same inventive concept, another aspect of the present invention, such as figure 2 As shown, an intrusion detection system based on artificial bee colony optimization BP algorithm is provided, and the system includes:

[0138] The data collection module is used to collect host log files and network data including the state and behavior of the system, network, data and user activities of the computer network system;

[0139] A preprocessing module, configured to preprocess the collected host log files and the network data into a package, obtain the feature vectors of the host log files and the network data and convert them into BP neural network algorithms the identified input value;

[0140] The BP neural network module is used to perform sample training on the feature vector of the input network data, and optimize the weight W of the input layer and the hidden layer in conjunction with the artificial bee colony algorithm ij and the weight W connecting th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method and system of a BP algorithm based on artificial swarm optimization. The method comprises the following steps: forming a packet through a collected host log file and network data, preprocessing the packet to obtain feature vectors of the host log file and the network data, and converting the feature vectors into input values that can be identified by a BP neural network algorithm; initializing the BP neural network algorithm, using a weight Wij connecting an input layer and a hidden layer and a weight Wjk connecting the hidden layer and anoutput layer as optimization targets of the artificial swarm algorithm to initialize the parameters of the artificial swarm algorithm, and transmitting an optimal honey source to the BP neural networkalgorithm to replace the weight Wij connecting the input layer and the hidden layer and the weight Wjk connecting the hidden layer and the output layer; and making a corresponding response operationon the behavior of a user according to the output value of the BP neural network algorithm. By adoption of the intrusion detection method and system, the problems of low convergence rate, vulnerability to local minimum point and large calculation amount of the existing BP neural network.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to an intrusion detection method based on an artificial bee colony optimized BP algorithm and a system thereof. Background technique [0002] The rapid development of Internet technology and the popularization of the Internet have profoundly changed the work and life of human beings. However, computers and the Internet are double-edged swords. While bringing convenience to people's life and work, they also bring a series of security problems. How to ensure the normal operation of the information society, the security of network information is one of the most important links. [0003] The Internet is open to anyone with a network connection and an ISP account, in fact it was designed as an open network itself. Therefore, it does not have much built-in ability to make information safe. From a security perspective, the Internet is inherently insecure. Security in a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/08G06N3/00
CPCG06N3/006G06N3/084H04L63/1416H04L63/1425
Inventor 李文黄丽韶扈乐华
Owner HUNAN UNIV OF SCI & ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products