Unlock instant, AI-driven research and patent intelligence for your innovation.

Parallel Intrusion Detection Method and System Based on Imbalanced Data Deep Belief Network

A technology of deep belief network and intrusion detection, applied in neural learning methods, biological neural network models, character and pattern recognition, etc., can solve the problem of lack of pertinence in unbalanced data sets, increase classification accuracy, and optimize iterative process , Improve the effect of iteration efficiency

Active Publication Date: 2022-06-28
HUNAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above defects or improvement needs of the prior art, the present invention provides a parallel intrusion detection method and system based on unbalanced data deep belief network, the purpose of which is to solve the lack of pertinence of existing intrusion detection methods for unbalanced data sets At the same time, the speed of optimizing the parameters of the deep belief network model is improved. Finally, the invented method can effectively improve the detection accuracy and detection speed of intrusion detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Parallel Intrusion Detection Method and System Based on Imbalanced Data Deep Belief Network
  • Parallel Intrusion Detection Method and System Based on Imbalanced Data Deep Belief Network
  • Parallel Intrusion Detection Method and System Based on Imbalanced Data Deep Belief Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as there is no conflict with each other.

[0085] like figure 1 As shown, the present invention provides a parallel intrusion detection method based on unbalanced data deep belief network, comprising the following steps:

[0086] (1) Obtain an unbalanced dataset, use the Neighborhood Cleaning Rule (NCL) algorithm to undersample the unbalanced dataset, and use the Gravity-based Clustering Approach (GCA) The algorithm performs clustering pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a parallel intrusion detection method based on unbalanced data deep belief network, which reads unbalanced data set data, uses an improved NCL algorithm to perform under-sampling processing on unbalanced data, reduces the proportion of most samples, and makes The data distribution of the data set is balanced; the improved differential evolution algorithm is used to optimize the parameters of the deep belief network model on the distributed memory computing platform Spark platform to obtain the optimal model parameters; the feature extraction of the data set data is performed, and then the weighted The kernel extreme learning machine is used for intrusion detection and classification. Finally, multiple weighted kernel extreme learning machines with different structures are trained in parallel by multi-threading as the base classifier, and a multi-classifier intrusion detection model based on adaptive weighted voting is established for parallel intrusion. detection. The invention can solve the technical problems that the existing intrusion detection method lacks pertinence to the unbalanced data set and the training time is too long, and improves the speed of optimizing the parameters of the deep belief network model.

Description

technical field [0001] The invention belongs to the technical field of intrusion detection, and more particularly, relates to a parallel intrusion detection method and system based on unbalanced data deep belief network. Background technique [0002] With the development of society, the issue of network security has been paid more and more attention by people. Intrusion detection method is an effective and active defense method for network security problems. It judges whether there is abnormal intrusion behavior in the network by detecting information such as traffic in the network. Compared with the firewall, the security of the intrusion detection method is better. It not only requires less resources, basically does not affect the normal operation of the system, but also can be adjusted dynamically. [0003] The current mainstream intrusion detection methods mainly include: 1. Intrusion detection methods based on unbalanced data. The intrusion detection methods are mainly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V10/762G06V10/764G06V10/82G06K9/62G06N3/00G06N3/04G06N3/08
CPCG06N3/006G06N3/08G06N3/045G06F18/24143G06F18/23213G06F21/554G06N3/047G06N3/088G06N20/00G06N3/086G06N3/126G06F21/566G06F2221/034
Inventor 李肯立杜亮余思洋杨志邦周旭刘楚波唐卓
Owner HUNAN UNIV