Identification and processing of network abnormal events based on network intrusion detection algorithm

被引:0
|
作者
He, Yunbin [1 ]
机构
[1] College of Physics and Information Engineering, Zhaotong University, Unit 1, Building 3, Zuanshi Renjia, Zhuquan Road, Zhaoyang district, Zhaotong, Yunnan, China
关键词
Activation functions - Detection algorithm - Dynamic Bayesian networks - False alarm rate - Malicious attack - Network intrusion detection - Network parameters - Support vector machine algorithm;
D O I
10.6633/IJNS.201901_21(1).19
中图分类号
学科分类号
摘要
With the popularity of the Internet, people's lives are becoming more and more convenient, but the network se- curity problems are also becoming increasingly serious. In order to better prevent internal or external malicious attacks and protect the network security of users, this study chose deep neural network (DNN) learning algorithm and convolutional neural network (CNN) learning algorithm as network intrusion detection algorithms and tested two algorithms under different parameters and activation functions with KDD99 data set on the MATLAB simulation platform. Moreover, the performance of the algorithms was compared with those of other clinic algorithms and deep learning algorithms. The results suggested that the recognition performance of DNN and CNN learning algorithms was different under different network parameters and activation functions. When ReLU function was used as the activation function, the recognition performance was the best. The network parameters of DNN and CNN were 122-250-520-250-5 and was 10(18)-14(22)-16 (18), respectively. The recognition performance of DNN and CNN learning algorithms were better than those of the classical algorithms, self-organizing map (SOM) and support vector machine (SVM) algorithms, but was worse than that of dynamic Bayesian network (DBN) algorithm. DNN was superior to DBN in the aspect of false alarm rate; overall, DNN algorithm was superior to DBM algorithm. © 2019 Femto Technique Co., Ltd.
引用
收藏
页码:153 / 159
相关论文
共 50 条
  • [1] Network intrusion detection algorithm based on deep neural network
    Jia, Yang
    Wang, Meng
    Wang, Yagang
    IET INFORMATION SECURITY, 2019, 13 (01) : 48 - 53
  • [2] Network intrusion detection based on GMKL Algorithm
    Li, Yuxiang
    Wang, Haiming
    Yu, Hongkui
    Ren, Changquan
    Geng, Qingjia
    Journal of Networks, 2013, 8 (06) : 1315 - 1321
  • [3] A Clustering based Algorithm for Network Intrusion Detection
    Arya, K. V.
    Kumar, Hemant
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 193 - 196
  • [4] Research on Network Traffic Data Anomaly Identification and Detection Based on an Intrusion Detection Algorithm
    Zhang, Hui
    International Journal of Network Security, 2022, 24 (04) : 689 - 694
  • [5] Abnormal traffic detection for network intrusion detection
    Heo, YJ
    Ryu, KW
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 387 - 390
  • [6] Research on the data pre-processing in the network abnormal intrusion detection
    Yin, Guisheng, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (06):
  • [7] Research on the data pre-processing in the network abnormal intrusion detection
    Cui, Xiang
    Yin, Guisheng
    Teng, Xuyang
    Open Automation and Control Systems Journal, 2014, 6 (01): : 1228 - 1232
  • [8] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [9] Quantum Evolutionary Algorithm Based Network Intrusion Detection
    Yin, Xiangdong
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 683 - 685
  • [10] AdaBoost-based algorithm for network intrusion detection
    Hu, Weiming
    Hu, Wei
    Maybank, Steve
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2008, 38 (02): : 577 - 583