Network intrusion detection method on the basis of combining PCA and Bayesian

A network intrusion detection and combination technology, which is applied in the field of network intrusion detection based on the combination of PCA and Bayesian, can solve the problems of long detection time and ineffective attack technology, and achieve the goal of improving detection accuracy and improving detection time Effect

Inactive Publication Date: 2018-10-09
BEIJING INSTITUTE OF TECHNOLOGYGY +1
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Traditional file analysis intrusion detection methods may be effective against common and conventional types of attacks, but they are not effective against new attack techniques
Although the commonly used data mining methods can be applied to new types of attacks, there is a problem that the detection time is too long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method on the basis of combining PCA and Bayesian
  • Network intrusion detection method on the basis of combining PCA and Bayesian
  • Network intrusion detection method on the basis of combining PCA and Bayesian

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0023] With the continuous change of network intrusion attack means, new attack types are constantly generated, and the traditional detection method based on rule files cannot adapt to the new attack type. Therefore, the present invention chooses an intrusion detection method based on data mining. However, most of the existing intrusion detection methods in data mining have the problem that the detection time is too long and cannot be detected in time. Therefore, the present invention provides a network intrusion detection method based on the combination of PCA and Bayesian , first apply PCA to the training data set D and the test data set T to obtain the training data and test data after dimensionality reduction, which reduces the model training time of the Bayesian classifier and greatly shortens the detection time, and then adopts the fastest detection t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection method on the basis of combining PCA and Bayesian. The invention is capable of realizing fast and effective detection of common and conventional types of attacks and new types of attacks, and the detection time is short and the correct rate is high. The invention firstly applies PCA to the training data set and the test data set to obtain the dimension-reduced training data and test data so as to reduce the model training time and detection time of the Bayesian classifier, and then adopts the Bayesian classifier with the fastest detection time for intrusion detection to achieve rapid detection. At the same time, the invention also improves the PCA, and improves the correct rate of detection, so that the method provided by the inventionis efficient in both detection time and detection accuracy.

Description

technical field [0001] The invention relates to the technical field of network intrusion detection, in particular to a network intrusion detection method based on the combination of PCA and Bayesian. Background technique [0002] While the Internet brings convenience to people, there are also many security problems. Network attacks are happening all the time, and the research on network intrusion detection has important practical significance, and it is also a major challenge in the field of network security. [0003] Dorothy Denning defined intrusion detection in 1987: by monitoring network data information, detecting intrusion behavior, sending an alarm and responding before the intrusion behavior causes harm (Denning, DE.1987.AnIntrusion-Detection Model[J] .IEEE Transactions on Software Engineering, SE-13(2):222-232.). It can be found that an important feature of intrusion detection is immediacy. The detection method needs to quickly judge the attack information and rep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 胡昌振任家东刘智扬张炳赵小林单纯
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products