Improved RBF Network Intrusion Detection Model Based on Edge Computing with Multi-algorithm Fusion

被引:5
作者
Liu, Xuejun [1 ]
Li, Kaili [1 ]
Wang, Wenhui [1 ]
Yan, Yong [1 ]
Sha, Yun [1 ]
Chen, Jianping [1 ]
Qin, Jiaojiao [1 ]
机构
[1] Beijing Inst Petr & Chem Engn, Dept Informat Engn, 19 Qingyuan North Rd, Beijing, Peoples R China
关键词
RBF network; intrusion detection; kernel principal component analysis; grey wolf algorithm; edge computing;
D O I
10.15837/ijccc.2021.4.4232
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing is difficult to deploy a complete and reliable security strategy due to its dis-tributed computing architecture and inherent heterogeneity of equipment and limited resources. When malicious attacks occur, the loss will be huge. RBF neural network has strong nonlinear representation ability and fast learning convergence speed, which is suitable for intrusion detection of edge detection industrial control network. In this paper, an improved RBF network intrusion de-tection model based on multi-algorithm fusion is proposed. Kernel Principal Component Analysis (KPCA) is used to extract data dimensions and simplify data representations. Then Subtractive Clustering algorithm (SCM) and Grey Wolf algorithm (GWO) are used to jointly optimize RBF neural network parameters to avoid falling into local optimum, reduce the calculation of model training and improve the detection accuracy. The algorithm can better adapt to the edge com-puting platform with weak computing ability and bearing capacity. The experimental results of BATADAL dataset and Gas dataset show that the accuracy of the algorithm is over 99% and the training time of larger samples is shortened by 50 times for BATADAL dataset. The results show that the improved RBF network is effective in improving the convergence speed and accuracy in intrusion detection.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 34 条
[1]   Ensemble decision forest of RBF networks via hybrid feature clustering approach for high-dimensional data classification [J].
Abpeykar, Shadi ;
Ghatee, Mehdi ;
Zare, Hadi .
COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2019, 131 :12-36
[2]  
Ahmed Alisha, 2018, 2018 INT C ADV COMP
[3]   Numerical solution of time fractional tricomi-type equation by an RBF based meshless method [J].
Bhardwaj, Akanksha ;
Kumar, Alpesh .
ENGINEERING ANALYSIS WITH BOUNDARY ELEMENTS, 2020, 118 :96-107
[4]  
Chen Decheng, 2018, 2018 5 IEEE INT C CL, P23
[5]  
Chen G.M., SHIP ENG, P82, DOI [10.13788/j.cnki.cbgc.2019.04.15, DOI 10.13788/J.CNKI.CBGC.2019.04.15]
[6]  
Ferrari A, 2019, IEEE LAT AM T, V17, P1191, DOI 10.1109/TLA.2019.8931208
[7]   Intrusion Detection System Using Voting-Based Neural Network [J].
Haghighat, Mohammad Hashem ;
Li, Jun .
TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (04) :484-495
[8]   GeneticKNN: a weighted KNN approach supported by genetic algorithm for photometric redshift estimation of quasars [J].
Han, Bo ;
Qiao, Li-Na ;
Chen, Jing-Lin ;
Zhang, Xian-Da ;
Zhang, Yan-Xia ;
Zhao, Yong-Heng .
RESEARCH IN ASTRONOMY AND ASTROPHYSICS, 2021, 21 (01)
[9]  
Han YongMing, 2020, ENERGY, V209, P2020
[10]  
Hu Y, 2020, CHINA COMMUN, V17, P1, DOI 10.23919/JCC.2020.04.001