Network intrusion detection method

A network intrusion detection and network testing technology, applied in the field of network security, can solve problems such as difficulty in obtaining the global optimal solution and poor search ability, so as to improve the detection accuracy rate, improve the overall performance, and reduce the false negative rate and false negative rate rate effect

Active Publication Date: 2019-07-30
SHANGHAI MARITIME UNIVERSITY
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The genetic algorithm has a strong global search ability, but the local search ability is poor, and it is difficult to obtain the global

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network intrusion detection method
  • Network intrusion detection method
  • Network intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0124] According to the following Figure 1 to Figure 4 , the preferred embodiment of the present invention is described in detail.

[0125] like figure 1 As shown, the present invention provides a network intrusion detection method, comprising the following steps:

[0126] Step S1, searching network data to construct a test network data set;

[0127] Step S2, using Kernel Principal Component Analysis (KPCA) to perform feature extraction on the test network data set to construct a training data set;

[0128] Step S3, put the training data set into the SVM classifier for training to obtain the characteristic data set;

[0129] Step S4, using the Genetic Algorithm (GA) to obtain the optimal feature subset from the feature data set;

[0130] Step S5, using the firefly swarm optimization algorithm (GSO) to obtain the overall local optimal feature subset and the optimal SVM parameter from the optimal feature subset;

[0131] Step S6: Process the training data set according to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network intrusion detection method. The network intrusion detection method includes: searching network data to construct a test network data set; performing feature extraction on the test network data set by utilizing a kernel principal component analysis method; constructing a training data set, putting the training data set into a support vector machine classifier for training; obtaining feature datasets, obtaining an optimal feature subset from the feature data set by using a genetic algorithm; utilizing a firefly swarm optimization algorithm to obtain the overalllocal optimal feature subset and the optimal support vector machine parameters from the optimal feature subset, processing the training data set according to the overall local optimal feature subset,and inputting the training data set into a support vector machine classifier for classification modeling to obtain a network intrusion detection model. According to the method, the simplicity and convenience of the algorithm are improved, abnormal data can be more effectively found from samples, the detection accuracy of network intrusion is effectively improved, the missing report rate and the false report rate are reduced, and the overall performance of network intrusion detection is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network intrusion detection method. Background technique [0002] With the development of network technology and network scale, network intrusion is becoming more and more serious, and the security problems such as system damage, information leakage, data damage, and illegal control caused by it have caused a huge threat to the development of the network. In order to ensure network security, various network security technologies emerge as the times require. Among them, network intrusion detection technology has become a research hotspot because of its active defense characteristics, and it is also closely related to the security of network service applications. To distinguish attacks from typical network accesses, machine learning methods are extended to include support vector machines (SVM) and genetic algorithms (GA). [0003] Network intrusion detection is essentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06N3/00G06N3/12
CPCG06N3/006G06N3/126G06F18/2411G06F18/214
Inventor 张婷韩德志
Owner SHANGHAI MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products