Intrusion detection method of cosine time-variant PSO-SVM

An intrusion detection and cosine technology, applied in the field of network information security, can solve the problems of PSO algorithm's local optimal search ability, particle imbalance, high false alarm rate, etc., to improve learning ability, increase detection rate, and good search ability Effect

Active Publication Date: 2018-08-28
JIANGNAN UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this method is that it can detect new unknown attacks, but the disadvantage is that the false alarm rate is high, and further research on detection features and algorithm design is needed
Although the intrusion detection model based on PSO-SVM is already a classic model in intrusion detection and has been widely used, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method of cosine time-variant PSO-SVM
  • Intrusion detection method of cosine time-variant PSO-SVM
  • Intrusion detection method of cosine time-variant PSO-SVM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Step 1: Numericalization and normalization in data preprocessing.

[0044] The NSL-KDD data set contains the basic characteristics of TCP connections, the content characteristics of TCP connections, time-based network traffic statistics and host-based network traffic statistics. Among them, there are 39 types of abnormal attacks in four categories: DOS, R2L, U2R, and PROBING. Normal is marked as 0, PROBING is marked as 1, DOS is marked as 2, and U2R is marked as 3; for the protocol type, 1 is icmp, 2 is tcp, 3 is udp, and 4 is others. For the ADFA data set, it is divided into Normal (Training and Validation) and Attack, and the Normal is marked as 1, and the Attack is marked as 2. At the same time, in order to reduce the interaction between different features, so that the importance of each feature is not affected by the value, the value is normalized, and the Min-Max standardization method is used to make it belong to [0,1]. The formula is as follows:

[0045]

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method of a cosine time-variant PSO-SVW, and belongs to the technical field of the network information security. The method comprises the following steps: performing numeralization processing on all data in a NSL-KDD data set and an ADFA intrusion detection data set in a normal sample and an attack sample, and then performing cosine time-variant PSO optimization, and performing a misuse detection by applying the cosine time-variant PSO-SVM. Compared with the existing partial time-variant plasma swarm optimized SVW model, the learning capacity of the time-variant plasma swarm algorithm in the detection process is improved according to the cosine function nonlinearity, the cosine time-variant acceleration coefficient expression way is simplified, and a value policy of the inertia weight is improved, and the elaborate degree and the searching efficiency of the current optimal target region searching are improved, thereby accelerating the convergence speed of the time-variant PSO-SVW intrusion detection model, and effectively improving the detection rate of the time-variant PSO-SVW intrusion detection model.

Description

technical field [0001] The invention relates to an intrusion detection method of cosine time-varying PSO-SVM, belonging to the technical field of network information security. Background technique [0002] Today, computer systems exist in almost every aspect of human life. However, the existing Internet is plagued by network security and data privacy issues, which will also become a major challenge and obstacle for the Industrial Internet of Things. Intrusion Detection System (IDS) monitors the behavior of the network environment and determines intrusion and legitimate activities. In particular, SCADA systems are used in key infrastructure facilities such as chemical plants, power transmission and distribution systems, water distribution networks, and sewage treatment facilities. The amount of data in the network environment has increased significantly, and the content is vulnerable to various attacks. Deploying an intrusion detection system in the above system is an import...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416H04L63/1441
Inventor 杨红浩周治平
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products