[1]曹耀彬,王亚刚. 免疫算法优化的RBF在入侵检测中的应用[J].计算机技术与发展,2017,27(06):114-118.
 CAO Yao-bin,WANG Ya-gang. Application of RBF Neural Network Optimized by Immune Algorithm in Intrusion Detection[J].,2017,27(06):114-118.
点击复制

 免疫算法优化的RBF在入侵检测中的应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年06期
页码:
114-118
栏目:
安全与防范
出版日期:
2017-06-10

文章信息/Info

Title:
 Application of RBF Neural Network Optimized by Immune Algorithm in Intrusion Detection
文章编号:
1673-629X(2017)06-0114-05
作者:
 曹耀彬王亚刚
 西安邮电大学 计算机学院
Author(s):
 CAO Yao-binWANG Ya-gang
关键词:
 入侵检测RBF神经网络中心点K-means免疫算法最小均方差
Keywords:
 intrusion detectionRBF neural network center pointK-meansimmune algorithmLMS
分类号:
TP301.6
文献标志码:
A
摘要:
 RBF(Radical Basis Function)神经网络是一种典型的三层前向神经网络.虽然RBF神经网络的非线性逼近能力、分类能力以及学习速度都要好于其他的神经网络,但是RBF神经网络在实际应用中隐含层中心点难求,不能被广泛地应用于入侵检测系统中.免疫算法是基于免疫系统的学习算法,免疫算法不仅对干扰具有较强维持系统平衡的能力,而且具有较强的模式分类能力.为了得到最优的RBF神经网络并将其应用到入侵检测系统中,提出了一种免疫算法优化的基于最小均方差的联合RBF神经网络,即IA-LMS-RBF算法.仿真实验结果表明,与传统的K-means和随机法选取基函数中心点相比,基于免疫算法求取中心点的LMS-RBF神经网络,不仅能明显地提高对已知攻击的检测能力,并且对于未知的攻击行为也能很好地进行识别.IA-LMS-RBF算法有效提高了入侵检测系统的效率,保证了计算机系统的安全性.
Abstract:
 RBF neural network is a typical three-layer feed forward neural network.Although approximation capacity,classification and learning speed of RBF neural network is superior to others,it is difficult to find the optimal value of the center point which is not used widely in intrusion detection system.Immune algorithm is a learning algorithm based on the immune system.It not only owns a strong ability to maintain system balance,but also has strong pattern classification.In order to get the optimal RBF neural network and apply it to the intrusion detection system,an immune algorithm has been proposed to optimize the LMS-RBF neural network,which is based on the minimum mean square,called as associated IA-LMS-RBF algorithm.Simulation results shows that compared with the traditional K-means and randomly to select the basis function center,the immune algorithm to strike the center of the LMS-RBF neural network not only significantly improves the ability to detect the known attacks,but also has a good recognition to the unknown attacks,IA-LMS-RBF algorithm can effectively improve the efficiency of intrusion detection system and make sure computer system is becoming more secure.

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(06):143.
[2]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(06):148.
[3]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(06):254.
[4]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(06):162.
[5]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(06):170.
[6]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(06):168.
[7]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(06):179.
[8]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(06):177.
[9]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(06):148.
[10]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(06):132.
[11]李蓉,周维柏. 基于多特征选取和类完全加权的入侵检测[J].计算机技术与发展,2014,24(07):145.
 LI Rong,ZHOU Wei-bai. Intrusion Detection Based on Multiple Feature Selection and Class Fully Weighted [J].,2014,24(06):145.
[12]李锋. 粒子群模糊聚类算法在入侵检测中的研究[J].计算机技术与发展,2014,24(12):138.
 LI Feng. Research on Fuzzy Clustering Algorithm Based on PSO in IDS[J].,2014,24(06):138.
[13]朱俚治. 一种基于误用检测的新算法[J].计算机技术与发展,2015,25(02):135.
 ZHU Li-zhi. A New Algorithm Based on Misuse Detection[J].,2015,25(06):135.
[14]陈桂林,王生光,徐静妹,等. 基于GA和组合核的SVM入侵检测算法[J].计算机技术与发展,2015,25(02):148.
 CHEN Gui-lin,WANG Sheng-guang,XU Jing-mei,et al. Intrusion Detection Algorithm of SVM Based on GA and Composed Kernel Function[J].,2015,25(06):148.
[15]张公让,万飞. 基于网格搜索的 SVM 在入侵检测中的应用[J].计算机技术与发展,2016,26(01):97.
 ZHANG Gong-rang,WAN Fei. Application of Support Vector Machine in Network Intrusion Detection Based on Grid Search[J].,2016,26(06):97.
[16]刘华春,候向宁,杨忠. 基于改进K均值算法的入侵检测系统设计[J].计算机技术与发展,2016,26(01):101.
 LIU Hua-chun,HOU Xiang-ning,YANG Zhong. Design of Intrusion Detection System Based on Improved K-means Algorithm[J].,2016,26(06):101.
[17]何文河[],李陶深[][],黄汝维[][]. 云环境下基于改进BP算法的入侵检测模型[J].计算机技术与发展,2016,26(02):87.
 HE Wen-he[],LI Tao-shen[][],HUANG Ru-wei[][]. Intrusion Detection Model Based on Improved BP Algorithm in Cloud Environment[J].,2016,26(06):87.
[18]牛永洁,薛宁静. 改进的免疫克隆算法在入侵检测中的应用[J].计算机技术与发展,2016,26(05):86.
 NIU Yong-jie,XUE Ning-jing. Application of Improved Immune Clonal Selection Algorithm in Intrusion Detection[J].,2016,26(06):86.
[19]陈天宇,吴凡,马世杰,等. 基于CS和LS-SVM的入侵检测算法[J].计算机技术与发展,2016,26(05):99.
 CHEN Tian-yu,WU Fan,MA Shi-jie,et al. Intrusion Detection Algorithm Based on Compressed Sensing and Least Square Support Vector Machine[J].,2016,26(06):99.
[20]胡波. 基于簇的移动自组网的IDMEF数据模型设计[J].计算机技术与发展,2016,26(08):93.
 HU Bo. Design of Data Model Intrusion of Detection Message Exchange Format in Wireless Ad Hoc Networks Based on Clusters[J].,2016,26(06):93.

更新日期/Last Update: 2017-07-26