A Network Intrusion Detection Method

A network intrusion detection and network data technology, applied in the field of network security, can solve the problems of insufficient efficiency and achieve the effect of improving detection rate and detection accuracy

Active Publication Date: 2021-06-08
GUILIN UNIV OF ELECTRONIC TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that the current network intrusion detection method is not efficient enough, the present invention provides a network intrusion detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Network Intrusion Detection Method
  • A Network Intrusion Detection Method
  • A Network Intrusion Detection Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific examples and with reference to the accompanying drawings.

[0040] The present invention mainly studies how to deeply improve ABC, adopts multi-bee colony mechanism with differential threshold, and embeds PSO algorithm, then applies the improved ABC-PSO algorithm to network intrusion detection, and finally improves the overall efficiency of network intrusion detection .

[0041] see figure 1 , a kind of network intrusion detection method based on ABC-PSO-SVM that the present invention proposes, it specifically comprises steps as follows:

[0042] Step 1. Preprocessing the test network data used to build the intrusion detector, that is, data encoding, numericalization and normalization, to form a training set.

[0043] Step 11, data encoding.

[0044] The data used in the experimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection method, which mainly utilizes the advantages of strong local search ability of the particle swarm algorithm to make up for the weak local search ability of the bee colony algorithm. In the traditional bee colony algorithm, the probability calculation method of observing bees following the leading bees is improved, and a more reasonable method of weighted anti-roulette and roulette is used to calculate the following probability; at the same time, the multi-bee method of differentiation threshold is introduced. The group mechanism further improves the search performance of the algorithm. The invention can improve the detection accuracy rate of the network intrusion detection system for unknown intrusions, and finally improve the detection rate of the entire intrusion detection system.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network intrusion detection method. Background technique [0002] With the rapid development of Internet technology, the issue of network information security has become the focus of common attention of all countries in the world. As a proactive security protection technology, intrusion detection is increasingly favored by network security researchers. Network intrusion detection mainly judges whether the user behavior is an intrusion by judging whether the data packets in the network are legal (according to the relevant information of the data packets). In network intrusion detection, the core module is the intrusion detection analysis engine, which mainly includes two parts: feature selection and classifier. The method of feature selection and the performance of the classifier directly affect the performance of the intrusion detection system. [0003] With the rise...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06N3/00G06K9/62
CPCG06N3/006H04L63/1416
Inventor 常亮张少伟古天龙徐周波李龙陈汉宜
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products