期刊文献+

基于改进蚁群算法的神经网络入侵检测方法研究

Based on improved ant colony algorithm of neural network intrusion detection method
原文传递
导出
摘要 提出一种改进的蚁群算法并与传统的BP神经网络相结合用于入侵检测,它既克服了BP传统神经网络的权值确定难度较大、收敛速度慢易陷入局部最小等缺陷,也通过BP神经网络的梯度信息弥补了单独使用蚁群算法所面临的不足.仿真实验结果表明,与传统方法相比,本方法步骤简化,速度及测试精度明显提高. This paper proposes an improved ant colony algorithm with the traditional BP network com- bination used in intrusion detection, it has overcome the traditional BP network weights to determine the difficulty of slow convergence speed, easy to fall into local minimum and other defects, but also by the BP network gradient information for individual use ant colony algorithm the deficiency. The simula- tion results show that compared with the traditional method, the method steps are simplified, speed and accuracy are increased obviously.
作者 吴春琼
出处 《福州大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第5期845-849,共5页 Journal of Fuzhou University(Natural Science Edition)
关键词 蚁群算法 神经网络 入侵检测 ant colony algorithm neural network intrusion detection
  • 相关文献

参考文献7

二级参考文献39

  • 1范华春,王颖,杨彬,李雪莹,陈宇,许榕生.基于网络处理器及协处理器的高速网IDS的研究[J].计算机工程与应用,2005,41(1):124-126. 被引量:5
  • 2王正群,陈世福,陈兆乾.并行学习神经网络集成方法[J].计算机学报,2005,28(3):402-408. 被引量:36
  • 3杨种学,杨宁.基于BP神经网络的异常入侵检测方法[J].南京晓庄学院学报,2006,22(6):82-86. 被引量:2
  • 4Andrew H S. Identify important features for intrusion detection using support vector machines and neural networks[A]. Proceedings of the 2003 International Symposium on Applications and the Internet Technology[C]. New Jersey:IEEE Computer Society Press, 2003. 209-216.
  • 5Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines[A]. Proceedings of the International Joint Conference on Neural Networks[C]. New Jersey: IEEE Computer Society Press, 2002.1 702-1 707.
  • 6Martin B, Rossouw V S. Utilizing fuzzy logic and trend analysis for effective intrusion detection[J]. Computers and Security, 2003,22(5):423-434.
  • 7Wang Yong, Yang Huihua, Wang Xingyu, et al. Distributed intrusion detection system based on data fusion method [A]. 5th World Congress on Intelligent Control and Automation[C]. New Jersey:IEEE Press, 2004.250-252.
  • 8Matthew V M, Philips K C. An analysis of the 1999 DARPA/Lincoln laboratories evaluation data for network anomaly detection[DB/OL]. http://www, cs.fit.edu/~mmahoney/,2003.
  • 9何倩.[D].桂林:桂林电子工业学院,2003.
  • 10陈田良 王煦法 庄镇泉.遗传算法及其应用[M].北京:人民邮电出版社,1996..

共引文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部