A New Intrusion Detection Method Based on Adaptive Feature Extraction

被引:0
作者
Wu, Ya-Li [1 ]
Li, Guo-Ting
Fu, Yu-Long
Wang, Xiao-Peng
机构
[1] Xian Univ Technol, Sch Automat & Informat Engn, Xian 710048, Shannxi, Peoples R China
来源
PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC) | 2019年
关键词
intrusion detection; feature extraction; SSAE; deep learning; difference brain storm optimization;
D O I
10.23919/chicc.2019.8866263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compared with traditional machine learning, intrusion detection based on deep learning has the advantage of feature extraction. Auto-encoders, owing to having good feature extraction and dimensionality reduction ability, are known for the superior performance. However, the network structure selection is time-consuming and laborious. The essential features cannot be automatically extracted according to different distribution characteristics of the data set. Moreover, the existing data pre-processing method fails to adapt the model better. Based on the stack sparse auto-encoders (SSAE), we propose a new intrusion detection model named DBSO-SSAE. The algorithm is based on difference brain storm optimization (DBSO) which automatically adapts to selection network framework. Meanwhile, a new normalization strategy is introduced to further improve the accuracy of the model. The simulation results show that DBSO-SSAE greatly reduces the complexity of manual tuning and increases the adaptability of the network model.
引用
收藏
页码:8643 / 8648
页数:6
相关论文
共 23 条
[1]  
[Anonymous], 2015, 201503 SEOUL NAT U
[2]  
Bengio P., 2006, Advances in Neural Information Processing Systems 19 (NIPS06), P153, DOI DOI 10.5555/2976456.2976476
[3]  
[高妮 Gao Ni], 2017, [电子学报, Acta Electronica Sinica], V45, P730
[4]  
Iyer A, 2004, INT C INF TECHN COD
[5]  
Lakshmanan Sairamesh, 2014, INT J APPL ENG RES, V9, P11693
[6]  
Li Y C, 2008, INT C WAV AN PATT RE
[7]   Fang: A firewall analysis engine [J].
Mayer, A ;
Wool, A ;
Ziskind, E .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :177-187
[8]   Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks [J].
Ren, Shaoqing ;
He, Kaiming ;
Girshick, Ross ;
Sun, Jian .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017, 39 (06) :1137-1149
[9]  
Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229
[10]   Visualization of big data security: a case study on the KDD99 cup data set [J].
Ruan, Zichan ;
Miao, Yuantian ;
Pan, Lei ;
Patterson, Nicholas ;
Zhang, Jun .
DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (04) :250-259