Semi-supervised intrusion detection method combining improved Grey Wolf algorithm

An intrusion detection and semi-supervised technology, applied in the field of network information security, can solve the problems of low solution accuracy, difficulty in coordinating the exploration and development capabilities of the wolf algorithm, and achieve the effect of high detection accuracy and guaranteed detection accuracy.

Active Publication Date: 2018-09-11
JIANGNAN UNIV
View PDF6 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the basic Gray Wolf Algorithm (GWO) has the disadvantages of difficulty in coordinating exploration and development capabilities and low solution accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-supervised intrusion detection method combining improved Grey Wolf algorithm
  • Semi-supervised intrusion detection method combining improved Grey Wolf algorithm
  • Semi-supervised intrusion detection method combining improved Grey Wolf algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to solve the difficulty in adaptively selecting the characteristics of unknown attack traffic in the industrial control network, and the time-consuming and labor-intensive training data sets of a large number of accurately marked, the present invention adopts the cloud gray wolf algorithm to optimize the semi-supervised learning method of the K-means clustering center, using a small amount of Correctly mark the samples to generate a large-scale training data set, and then use the cloud gray wolf algorithm to optimize the parameters of the single-class support vector machine to more efficiently detect unknown attacks.

[0035] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0036] Step 1: Combine the basic GWO algorithm with the cloud model algorithm, optimize the control parameters of the GWO algorithm, and obtain the cloud GWO algorithm, so that it can obtain a larger search area and increase its ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a semi-supervised intrusion detection method combining the improved grey wolf algorithm, and belongs to the technical field of network information security. The method can effectively avoid the defect that the basic GWO algorithm is prone to premature convergence, and balance the global exploration and local development ability of the GWO algorithm; and the cloud GWO algorithm is used to optimize the K-means algorithm to mark data having similar features, and realization of generation of the large-scale accurate mark training data set is realized on the basis of manually marking the data in a small amount. The proportion of unmarked data and marked data is provided, the phenomenon of "under-fitting" and "over-fitting" of the model is avoided, and the detection accuracy of the model is ensured. The optimized semi-supervised learning method is combined with the cloud GWO algorithm to optimize parameters of a single-class support vector machine model. Compared withthe unilateral optimization, the invention achieves higher detection precision.

Description

technical field [0001] The invention relates to a semi-supervised intrusion detection method of an improved wolf algorithm, which belongs to the technical field of network information security. Background technique [0002] With the rapid development of Industry 4.0 and related technologies, however, there are inevitable loopholes in the existing industrial communication protocols, which make the industrial control network vulnerable to malicious attacks by attackers. In 2010, the attackers used the Stuxnet virus to destroy Iran’s nuclear facilities, causing A serious accident occurred, which sounded the alarm for the safety of industrial control systems. [0003] Industrial control network intrusion detection can be divided into two categories: misuse detection and anomaly detection. For anomaly detection, it can be divided into three categories: statistics-based methods, knowledge-based methods and machine learning-based methods. Commonly used industrial control network i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06N3/00
CPCG06N3/006G06F18/2155G06F18/2411
Inventor 杨红浩周治平
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products