Intrusion Detection Engineering Management Based on Optimization of BP Neural Network

Article Preview

Abstract:

In order to short the modelling time of BP neural network, this paper designs a kind of genetic algorithm to optimize it. By encoding the individual components, initializing the number of populations, and designing proper fitness function, a binary coding genetic algorithm is provided for BP neural network. And it is used to optimize input variables of BP neural network and reduce its dimension. The experiment is carried out based on KDD Cup 99 data set. The results show that the optimized model has shorter modelling time.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1228-1232

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shingo Mabu, Ci Chen, Nannan Lu (2011) An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming. Ieee Transactions On Systems, Man, And Cybernetics 41(1): 130-139.

DOI: 10.1109/tsmcc.2010.2050685

Google Scholar

[2] Khan, L., Awad, M., Thuraisingham, B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J 16: 507–521.

DOI: 10.1007/s00778-006-0002-5

Google Scholar

[3] Zheng, J., Hu, M (2005) Intrusion detection of DoS/ DDoS and probing attacks for web services. In: Proceedings of the WAIM, p.333–344. Hangzhou 3739: 11-13.

DOI: 10.1007/11563952_30

Google Scholar

[4] Elshoush Huwaida Tagelsir, Osman Izzeldin Mohamed: Alert correlation in collaborative intelligent intrusion detection systems-A survey. Applied Soft Computing. 11(7), 4349-4365(2011).

DOI: 10.1016/j.asoc.2010.12.004

Google Scholar

[5] S. Chebrolu, A. Abraham, and J. P. Thomas (2005) Feature deduction and ensemble design of intrusion detection systems. Comput. Secur 24(4): 295-307.

DOI: 10.1016/j.cose.2004.09.008

Google Scholar

[6] W. Lee and S. J. Stolfo (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur 3(4): 227-261.

DOI: 10.1145/382912.382914

Google Scholar

[7] Swarup K S, Corthis P B (2002) ANN approach assesses system security. Computer Applications in Power 15(3): 32-38.

DOI: 10.1109/mcap.2002.1018820

Google Scholar