期刊文献+

基于改进蚁群算法优化的模糊支持向量机的网络入侵检测技术探究

Research on Network Intrusion Detection Technology Based on Improved Ant Colony Optimization Fuzzy Support Vector Machine
在线阅读 下载PDF
导出
摘要 网络使用量不断增加的同时,网络入侵形式也日趋多样,网络安全受到了严重威胁,因此可将改进蚁群算法优化的模糊支持向量机算法应用于网络入侵检测中。本文首先分析网络入侵检测的基本原理,研究网络入侵判别的数学模型;其次,分析模糊支持向量机的基本原理,构建模糊支持向量机的数学模型;然后,讨论改进蚁群算法的基本原理,设计改进蚁群算法的基本流程。最后,进行网络入侵检测的仿真分析。仿真结果表明,该算法能够提高网络入侵检测的准确性。 As the network usage keeps increasing, the forms of network intrusion are also varying; therefore, network security is facing severe threat. To solve the problem, Fuzzy Support Vector Machine (FSVM) optimized by the improved ant colony algorithm can be applied to network intrusion detection. Firstly, the essay analyzed the fundamental principles of network intrusion detection and studied on the mathematical model distinguishing network intrusion. Next, the essay analyzed the fundamental principles of FSVM and built the mathematical model of FSVM. Then, the essay discussed the fundamental principles of improving ant colony algorithm and designed the basic procedure to improve the ant colony algorithm. At last, the essay conducted simulated analysis on network intrusion detection. As indicated by the simulation results, this algorithm can improve the accuracy of network intrusion detection.
作者 崔玉礼
机构地区 烟台职业学院
出处 《长春师范大学学报》 2017年第8期29-33,共5页 Journal of Changchun Normal University
关键词 改进蚁群算法 模糊支持向量机 网络入侵检测 improved ant colony algorithm fuzzy support vector machine network intrusion detection
  • 相关文献

参考文献5

二级参考文献37

  • 1高海华,杨辉华,王行愚.基于BPSO-SVM的网络入侵特征选择和检测[J].计算机工程,2006,32(8):37-39. 被引量:20
  • 2吴靓,何清华,黄志雄,邹湘伏.基于蚁群算法的多机器人集中协调式路径规划[J].机器人技术与应用,2006(3):32-37. 被引量:6
  • 3田俊峰,赵卫东,杜瑞忠,蔡红云.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115-120. 被引量:15
  • 4崔玉洁,张祖立,白晓虎.采摘机器人的研究进展与现状分析[J].农机化研究,2007,29(2):4-7. 被引量:63
  • 5Denning D.E. An Intrusion Detection Model[J]. IEEE Trans- action on Software Engineering, 2010,13(2): 222-232.
  • 6Alomo E J, Domingues E, Luque R M, et al . An intrusion detection system based on hierarchical self-organization [J]. Journal of Information Assurance and Security4, 2009, 4(3): 209-216.
  • 7Huan H P, Yang F C, Wang M T, et al Intrusion detection based on active networks [J]. Journal of Information Sci- ence and Engineering, 2009, 25(3): 843-859.
  • 8Yang X S, Gandomi A H. Bat algorithm: a novel approach for global engineering optimization [J].Engineering Compu- tations, 2012,29(5): 464-483.
  • 9Wong SKM,Ziarko W.On optimal decision rules in decision tables. Bulletin of the Polish Academy of Sciences . 1985
  • 10Rough sets[J]. International Journal of Computer & Information Sciences . 1982 (5)

共引文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部