Intrusion detection method and device

A technology of intrusion detection and ant colony algorithm, applied in computer security devices, instruments, artificial life, etc., can solve the problem of low intrusion detection performance

Active Publication Date: 2020-01-24
ZHONGSHAN POLYTECHNIC
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present application provides an intrusion detection method and device, which can solve the problem of low intrusion detection performance in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and device
  • Intrusion detection method and device
  • Intrusion detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0082] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other Presence or addition of features, wholes, steps, operations, elements, components and / or collections thereof.

[0083] It should...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of computer application, and provides an intrusion detection method and device, and the method comprises the steps: carrying out the preliminary dimension reduction of a data subset of each intrusion type through an information entropy theory, obtaining a feature point corresponding to the intrusion type, and carrying out the construction to obtaina feature topology corresponding to each intrusion type; training a preset intrusion detection model based on the harmonic function, and adjusting parameters for optimizing an ant colony algorithm and parameters of a classifier based on a support vector machine in the intrusion detection model; and obtaining a feature subset according to the parameters of the intrusion detection model and ant movement, and determining a target feature subset solved by the ant colony after a preset number of training times so as to detect an intrusion type existing in the to-be-detected object through the target feature subset. Parameters of the ant colony and the support vector machine are trained, optimized and improved according to a ten-fold cross validation method, redundant features in a data set areremoved, and the detection performance of the intrusion detection method is improved.

Description

technical field [0001] The application belongs to the field of computer application technology, and relates to an intrusion detection method and device. Background technique [0002] With the surge of network traffic, higher requirements are put forward for the performance of intrusion detection systems (Intrusion Detection Systems, IDS). Network traffic contains a large amount of feature information, including features with low correlation with detection targets and features with high correlation with other features. These two types of features can be collectively referred to as redundant features. Too many redundant features will increase the time-space complexity of the IDS detection algorithm and reduce the detection performance of the IDS. In the prior art, solving feature subsets based on traditional ant colony algorithm or particle swarm optimization algorithm is easy to fall into local optimum, and the solution time is long and the efficiency is low, which reduces t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06N3/00
CPCG06F21/554G06N3/006
Inventor 梁本来
Owner ZHONGSHAN POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products