Network Intrusion Detection Method Based on Radial Basic Function Neural Network

被引:5
作者
Tian, Jingwen [1 ]
Gao, Meijuan [1 ,2 ]
Zhang, Fan [2 ]
机构
[1] Beijing Union Univ, Coll Automat, Beijing, Peoples R China
[2] Beijing Univ Chem Technol, Sch Informat Sci, Beijing, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2 | 2009年
关键词
intrusion detection; intrusion behaviors; radial basic function neural network; K-nearest neighbor algorithm;
D O I
10.1109/CIT.2009.49
中图分类号
F [经济];
学科分类号
02 ;
摘要
Aimed at the network intrusion behaviors are characterized with uncertainty, complexity, diversity and dynamic tendency and the advantages of radial basic function neural network (RBFNN), an intrusion detection method based on radial basic function neural network is presented in this paper. We construct the structure of RBFNN that used for detection network intrusion behavior, and adopt the K-Nearest Neighbor algorithm and least square method to train the network. We discussed and analyzed the impact factor of intrusion behaviors. With the ability of strong function approach and fast convergence of radial basic function neural network, the network intrusion detection method based on radial basic function neural network can detect various intrusion behaviors rapidly and effectively by learning the typical intrusion characteristic information. The experimental result shows that this intrusion detection method is feasible and effective.
引用
收藏
页码:369 / +
页数:2
相关论文
共 9 条
[1]  
Guojun Wang, 2008, GUANGXI J LIGHT IND, P51
[2]   Layered Neural Networks with Gaussian Hidden Units as Universal Approximations [J].
Hartman, Eric J. ;
Keeler, James D. ;
Kowalski, Jacek M. .
NEURAL COMPUTATION, 1990, 2 (02) :210-215
[3]  
Jiao L, 1995, NEURAL NETWORK SYSTE
[4]   The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors [J].
Joo, D ;
Hong, T ;
Han, I .
EXPERT SYSTEMS WITH APPLICATIONS, 2003, 25 (01) :69-75
[5]  
JUAN MET, 2004, COMPUT COMMUN, V27, P1569
[6]  
Luan Qing-lin, 2008, Computer Engineering and Design, V29, P3022
[7]  
*MIT LINC LAB, DARPA INTR DET EV EB
[8]  
THEUNS V, 2002, COMPUT COMMUN, V25, P1356
[9]  
Zhao Z., 1996, INTRO FUZZY THEORY N