Intrusion Detection Method Based on Two-layer Heterogeneous Ensemble Learner

An intrusion detection, double-layer heterogeneous technology, applied in the field of network security, can solve the problems of low false positive rate and false negative rate, affect the practicality, and high cost, and achieve the goal of reducing time consumption, reducing overall classification errors, and reducing data dimensions Effect

Active Publication Date: 2020-10-16
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is not advisable for intrusion detection, because the large time consumption will affect its practicality
[0007] To sum up, most of the current intrusion detection applications are unable to cope with unknown attacks, and although there are some preliminary applications of anomaly-based intrusion detection methods, most of them guarantee the false positive rate and false negative rate at the cost of time consumption.
Due to the high cost of false positives and false negatives in intrusion detection, the existing methods cannot fully meet the requirements of high accuracy, low false positive rate and false negative rate, and less time-consuming intrusion detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion Detection Method Based on Two-layer Heterogeneous Ensemble Learner
  • Intrusion Detection Method Based on Two-layer Heterogeneous Ensemble Learner
  • Intrusion Detection Method Based on Two-layer Heterogeneous Ensemble Learner

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and understandable, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings . It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] This embodiment discloses an intrusion detection method based on a two-layer heterogeneous ensemble learner. The general idea of ​​this method is to adopt a two-layer heterogeneous learner ensemble learning strategy based on probability weighted voting, while ensuring the accuracy of intrusion detection In this way, the false positive rate and false negative rate are reduced, and the time consumption is minimized. This method is divided into ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method based on a two-layer heterogeneous integrated learner, comprising the following steps: using a PKPCA data dimensionality reduction algorithm to perform dimensionality reduction processing on original data to obtain a preprocessing data set; using N classifiers to preprocess The data set is processed, and the hierarchical ten-fold cross-validation method is used to prevent overfitting; the classifier evaluation algorithm is used to select the best M classifiers as heterogeneous learners, where 2≤M

Description

technical field [0001] The invention proposes an intrusion detection method based on a double-layer heterogeneous integrated learner, which adopts an anomaly-based strategy for intrusion detection and belongs to the field of network security. Background technique [0002] Intrusion detection technology is a common method to detect network security attacks. The current intrusion detection method is divided into two categories. One is based on misuse of the intrusion detection method, which uses the method of signature pattern matching. The basic principle of this type of method is to compare the known signature or attack pattern with the monitored traffic. Match network traffic information to monitor for signs of intrusion. The advantage is that the false positive rate is low, but the difficulty lies in how to design patterns that can express "intrusion" phenomena without including normal activities. Its disadvantage is that it can only model known attacks, and it is diffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416G06F18/2135G06F18/254G06F18/259
Inventor 凌玥刘玉岭卢志刚李宁姜波朱燕刘俊荣
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products