The Design of Improved Elman Network Intrusion Detection Algorithm in Digital Campus Network

Article Preview

Abstract:

With the development of digital campus network users, web users exhibit scale up, the campus network users to use different computer level each are not identical, uneven, a potential threat to network is more serious, campus network security has become an urgent need to solve the problem. In this paper, based on the neural network, the concept of Elman memory, and proposed an improved algorithm of Elman neural network, the realization of network intrusion detection. The experimental results show that, the algorithm can effectively improve the accuracy of network intrusion detection algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1049-1050)

Pages:

2096-2099

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Li Yang, Mr. Fang, Guo Li, Tian Zhihong. Based on active learning and TCM-KNN algorithm supervised intrusion detection [J]. Chinese Journal of computers, 2007, 13 (08): 1504-1508.

DOI: 10.1016/j.cose.2007.10.002

Google Scholar

[2] Xiao Lizhong, Shao Zhiqing, Ma Hanhua, Wang Xiuying, Liu Gang. Automatic detection of network intrusion decision in number of clustering algorithm of [J]. software. 2008, 18 (08): 752-759.

Google Scholar

[3] Li Wen, Dai Yingxia, Yi Feng Lian, Feng Pinghui. Context dependent hybrid model of host intrusion detection system [J]. Journal of software based on the. 2009, 19 (01): 844-849.

Google Scholar

[4] Zhong Zhaoman, Li Cunhua, Yan. Research on real-time pipe network intrusion detection system and the implementation of computer engineering and application based on [J]. 2007, 21 (30): 852-857.

Google Scholar

[5] He Xiabing; Xue Bo; Chen Ling; Xu Yongan. Neural network RBF antibody group for computer engineering and design of intrusion detection, [J]. 2011, 25 (09): 1652-1656.

Google Scholar

[6] Lin Shengliang, Liu Zhi. To choose the parameters of support vector machine based on RBF kernel function[J]. Journal of Zhejiang University of Technology, 2007, 35 (2): 163-167.

Google Scholar

[7] Wang Junsong. Engineering modeling and prediction of traffic network [J]. computer based on Elman neural network. 2009, 21 (09): 142-145.

Google Scholar

[8] Dang Xiaochao, Hao Zhanjun. Prediction of [J]. computer network traffic based on improved Elman neural network. 2010, 22 (10): 274-279.

DOI: 10.3724/sp.j.1087.2010.02648

Google Scholar