Research on the Network Intrusion Detection Method Introduced with the View of Quantum Optimization

Article Preview

Abstract:

In the process of network intrusion detection, the network operating data need to be counted. Then, the network intrusion detection can be performed through comparing the values of the statistical results with the threshold values of network intrusion detection sequentially. However, too large network operating data will cause the overlapping of operating data during the detection, reducing the accuracy of the network intrusion detection. In order to avoid the defect mentioned above, a large data network intrusion detection algorithm introduced with quantum optimization neural network is proposed. Through the analysis of the principal component of the data, the process of the massive network operating data can be simplified. Using the quantum neural network method, the initial threshold of network intrusion feature can be achieved, so as to provide accurate data base for the network intrusion detection. Taking the advantage of small distance parade of genetic algorithms, the threshold characteristic is optimized and the mass redundancy interference characteristic is overcome, so as to fulfill the network intrusion detection. Experimental results show that the proposed algorithm used for network intrusion detection can improve the accuracy of detection effectively and achieve satisfactory results.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2687-2690

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. CACM, June 2004, 47: 53–57.

Google Scholar

[2] Anjum F, Subhadrabandhu D, Sarkar S, et al. On Optimal Placement of Intrusion Detection Modules in Sensor Networks[C]. 1st International Conference on Broadband Networks. Washington: IEEE Press , 2004: 433–439.

DOI: 10.1109/broadnets.2004.52

Google Scholar

[3] Bandyopadhyay S, Giannella C, Maulik U, et al. Clustering distributed data streams in peer-to-peer environments[J]. Information Sciences, 2006, 176 : 1952–(1985).

DOI: 10.1016/j.ins.2005.11.007

Google Scholar

[4] Onat I and Miri A. An intrusion detection system for wireless sensor networks[J]. Wireless And Mobile Computing Networking And Communications, August 2005, 3: 253–259.

DOI: 10.1109/wimob.2005.1512911

Google Scholar

[5] D. Subhadrabandhu, F. Anjum, and S. Sarkar. On optimal placement of intrusion detection modules in sensor networks[C]. Proceedings of the First International Conference on Broadband Networks, 2004: 690-699.

DOI: 10.1109/broadnets.2004.52

Google Scholar