An Intrusion Detection Method Based on Two-way Optimal Support Vector Machine of Taboo and Artificial Bee Colony

A technology of support vector machine and artificial bee colony, which is applied in the field of network security, can solve the problems of inability to solve the minimum feature subset search, low feature selection search efficiency, and difficulty in synchronizing parameter optimization with search and modeling, so as to improve the neighborhood. Search capability, speed up algorithm convergence, expand the effect of diversity

Inactive Publication Date: 2021-08-03
GUILIN UNIV OF ELECTRONIC TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] What the present invention aims to solve is that the feature selection search efficiency in the existing intrusion detection model is not high, the minimum feature subset search cannot be solved, and the search and modeling are difficult to optimize parameters simultaneously. Intrusion Detection Method Based on Group Bidirectional Optimal Support Vector Machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Intrusion Detection Method Based on Two-way Optimal Support Vector Machine of Taboo and Artificial Bee Colony
  • An Intrusion Detection Method Based on Two-way Optimal Support Vector Machine of Taboo and Artificial Bee Colony
  • An Intrusion Detection Method Based on Two-way Optimal Support Vector Machine of Taboo and Artificial Bee Colony

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific examples and with reference to the accompanying drawings.

[0057] The present invention is based on the intrusion detection method of taboo and artificial bee colony bidirectional optimization support vector machine, firstly reconstructs the original artificial bee colony algorithm, the general idea is to encode the honey source and support vector machine parameters to be optimized synchronously, and use the random generation method Generate the initial solution of the nectar source, and execute the search strategy based on the taboo-artificial bee colony to find the optimal feature subset. Specifically, it includes introducing the first taboo table in the hired bee search stage, storing and memorizing the local optimal solutions found, and avoiding these local optimal solutions in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method based on tabu and artificial bee colony two-way optimization support vector machine. Firstly, the original artificial bee colony algorithm is reconstructed. The initial solution of the nectar source is generated randomly, and the optimal feature subset is searched based on the taboo-artificial bee colony search strategy. Specifically, it includes introducing the first taboo table in the initial search stage of hired bees, storing and memorizing the local optimal solutions found, and avoiding these local optimal solutions in the subsequent predetermined iterations; introducing the second taboo table in the observation bee stage At the same time, a reward and punishment mechanism is added to improve the fitness function of honey sources and increase the diversity of solutions; finally, a third taboo table is introduced in the scout bee stage to store solutions that have reached the maximum number of developments but whose fitness value has not improved. The invention has strong feasibility and good practicability.

Description

[0001] technology neighborhood [0002] The invention relates to the technical field of network security, in particular to an intrusion detection method based on a taboo and artificial bee colony bidirectional optimization support vector machine. Background technique [0003] In recent years, with the increasing scale of the network, while the computer network has brought convenience to people's life and work, the methods of network intrusion and attack have become more complex, and the losses caused by various destructive network attacks have become increasingly serious. Although traditional security defense methods and strategies have played a protective role in network security to a certain extent, they have been unable to prevent complex, changeable and increasingly rampant intrusions. Intrusion Detection System) came into being. This kind of active protection strategy technology has been valued by experts and scholars at home and abroad, and how to study an effective int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06N3/00
CPCG06F21/566G06N3/006
Inventor 古天龙陈汉宜李龙常亮徐周波张少伟
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products