Network intrusion detection method

A network intrusion detection and network data technology, applied in the field of network security, can solve the problems of insufficient efficiency and achieve the effect of improving detection rate and detection accuracy

Active Publication Date: 2018-11-02
GUILIN UNIV OF ELECTRONIC TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that the current network intrusion detection method is no

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method
  • Network intrusion detection method
  • Network intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific examples and with reference to the accompanying drawings.

[0040] The present invention mainly studies how to deeply improve ABC, adopts multi-bee colony mechanism with differential threshold, and embeds PSO algorithm, then applies the improved ABC-PSO algorithm to network intrusion detection, and finally improves the overall efficiency of network intrusion detection .

[0041] see figure 1 , a kind of network intrusion detection method based on ABC-PSO-SVM that the present invention proposes, it specifically comprises steps as follows:

[0042] Step 1. Preprocessing the test network data used to build the intrusion detector, that is, data encoding, numericalization and normalization, to form a training set.

[0043] Step 11, data encoding.

[0044] The data used in the experimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection method. The defect that a bee colony algorithm is weak in local searching capacity by mainly using the advantage that the particle swarm algorithmis strong in local search capacity is remedied. The method comprises the following steps: further mining the high-quality nectar source location selected by the bee colony algorithm by adopting the multi-particle swarm algorithm; improving a probability computing way that the scouter follows the leader in the traditional bee colony algorithm, and computing the following probability by adopting the method of combining the more reasonable weighting reverse roulette and the roulette; and importing the multi-bee colony mechanism with different thresholds to further improve the searching performance of the algorithm. Through the detection method disclosed by the invention, the detection accuracy rate on known intrusion by the network intrusion detection system can be improved, and the detection rate of the whole intrusion detection system is improved at last.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network intrusion detection method. Background technique [0002] With the rapid development of Internet technology, the issue of network information security has become the focus of common attention of all countries in the world. As a proactive security protection technology, intrusion detection is increasingly favored by network security researchers. Network intrusion detection mainly judges whether the user behavior is an intrusion by judging whether the data packets in the network are legal (according to the relevant information of the data packets). In network intrusion detection, the core module is the intrusion detection analysis engine, which mainly includes two parts: feature selection and classifier. The method of feature selection and the performance of the classifier directly affect the performance of the intrusion detection system. [0003] With the rise...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06N3/00G06N99/00
CPCG06N3/006H04L63/1416
Inventor 常亮张少伟古天龙徐周波李龙陈汉宜
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products