Security precautionary technology for enterprise information resource database based on genetic algorithm in age of big data

被引:2
作者
Chen, Guiping [1 ]
机构
[1] Guizhou Normal Univ, Sch Int Educ, Guiyang 550001, Guizhou, Peoples R China
关键词
Genetic algorithm; big data; network security; intrusion detection; INTRUSION DETECTION;
D O I
10.3233/JCM-193874
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The security precaution of enterprise information resource database is a problem that enterprises pay close attention to extensively. In this paper, intrusion detection technology was studied, and a hybrid genetic algorithm which combined genetic algorithm with Back Propagation (BP) neural network was developed. The algorithm was tested using KDD CUP 99 data set. The results showed that the convergence effect of the hybrid genetic algorithm was good, the detection rate of the algorithm for different attacks was higher than 80%, and the accuracy rate was over 90%. The detection rate, false alarm rate, accuracy rate and detection time of the hybrid genetic algorithm were 91.36%, 6.72%, 92.24%, and 0.34 s respectively, suggesting a better detection performance. The hybrid genetic algorithm also had an accuracy rate of 98.42% in the practical application in the information resource database of an enterprise in Guizhou, China. The hybrid genetic algorithm developed in this study has a good performance in intrusion detection and has great values for the security protection of enterprise information resource database.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 18 条
[1]  
[Anonymous], 2015, INT C COMP COMM INF, DOI DOI 10.1109/ICCCI.2015.7218109
[2]  
[Anonymous], 2015, Journal of Big Data, DOI DOI 10.1186/S40537-015-0013-4
[3]  
[Anonymous], 2016, P KOR ADV I SCI TECH
[4]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[5]  
Cui G.C., 2014, APPL MECH MAT, V631-632, P946
[6]   Mining network data for intrusion detection through combining SVMs with ant colony networks [J].
Feng, Wenying ;
Zhang, Qinglei ;
Hu, Gongzhu ;
Huang, Jimmy Xiangji .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 :127-140
[7]   Intrusion detection model with twin support vector machines [J].
He J. ;
Zheng S.-H. .
Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) :448-454
[8]  
Hosseini B.S.M., 2015, PROCEDIA COMPUTER SC, V55
[9]  
Jiang Lan, 2014, Advanced Materials Research, V1044-1045, P965, DOI 10.4028/www.scientific.net/AMR.1044-1045.965
[10]   A novel hybrid KPCA and SVM with GA model for intrusion detection [J].
Kuang, Fangjun ;
Xu, Weihong ;
Zhang, Siyang .
APPLIED SOFT COMPUTING, 2014, 18 :178-184