The research on network security detection based on improved genetic neural algorithm

被引:0
作者
Hui-fen, Liao [1 ]
机构
[1] Jiujiang University, China
来源
Advances in Information Sciences and Service Sciences | 2012年 / 4卷 / 13期
关键词
Detection; Genetic algorithm; Network security; Neural network;
D O I
10.4156/AISS.vol4.issue13.10
中图分类号
学科分类号
摘要
The methods for intrusion of network is diverse, as for the attack of virus and hacker, there are some issues that the detection speed is slow and accuracy is low due to unreasonable set of initial value of traditional method. In order to improve the accuracy of network detection, a genetic algorithm is proposed to optimize RBF neural network weight value. At first, by genetic algorithm find the most reasonable weight value of RBF neutral network, then study and detect the network data by adopting optimized RBF neural network. The test indicates compared with traditional network intrusion detection algorithm, the optimized RBF neural network improves the accuracy of network intrusion data detection, accelerates the speed of network intrusion, and improve the efficiency of detection.
引用
收藏
页码:69 / 75
页数:6
相关论文
共 15 条
[1]  
Weidong C., Zhenghua W., Xiai Y., The Research and Realization Based on Integrating Neural Network IDS, CS: Computer Simulation, pp. 134-137, (2007)
[2]  
Xuexiao L., Weimin, The Research of Classification Method on Intrusion Detection, CEA: Computing Engineering and Application, pp. 98-100, (2010)
[3]  
Haijun X., Fan H., Zhaoli Z., Junguo L., The Intrusion Detection Research Based on Fusion Classification and SVM, CS: Computer Simulation, pp. 130-132, (2008)
[4]  
Di W., Yaping Z., He G., Intrusion Detection New Method Based on Rough Set Theory and BP Neural Network, CRD: Computer Research and Development, pp. 437-441, (2006)
[5]  
Ma H., Jinfeng S., Xin Y., IDS of Mixed Neural Network on Genetic Algorithm Optimization, CT: Communication Technology, pp. 106-108, (2009)
[6]  
Wenli W., Limin H., Intrusion Detection Based on Rough Set, SM: Sensor and Microsystem, pp. 36-41, (2010)
[7]  
Zhijun Y., The Comprehensive Research of IDS, CED: Computer Engineering and Design, pp. 2199-2223, (2006)
[8]  
Ge S., Qiao Y., The Application on Abnormal Detection in Neural Network, CEA: Computer Engineering and Application, pp. 146-148, (2002)
[9]  
Li H., Xiaotong Z., Lizhu L., Optimization Design Method of RBF Neural Network Based on Genetic Algorithm, CS: Computer Simulation, pp. 67-69, (2003)
[10]  
Qi Y., Zhuang Y., Shi J., An Evolutionary MAC Protocol based on FPRP for Decreasing Delay, JDCTA: International Journal of Digital Content Technology and Its Applications, 4, 9, pp. 194-200, (2010)