The Development of Intrusion Detection System Based on Improved BP Neural Network

Article Preview

Abstract:

BP neural network is a multilayer feed-forward neural network, it achieved from input to output arbitrary nonlinear mapping, and weights are adjusted by using the back propagation learning algorithm. Intrusion detection systems using the learning ability of neural network to extract the network data profile, and it also can use the neural network has the ability of self-learning and parallel processing ability, through the construction of intelligent neural network classifier to identify abnormal, so as to achieve the purpose of detecting intrusion behavior. The paper proposes the development of intrusion detection system based on improved BP neural network. Experimental results show that the proposed algorithm has high efficiency.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 718-720)

Pages:

1973-1979

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xiaofei Wang, Jinyan Chen, Dong Li, Xu Zhao, Haiming Shao, "The Establishment of the Human Body's Perception Current Threshold Model Based on BP Neural Network", IJACT, Vol. 4, No. 20, p.659 ~ 665, 2012.

DOI: 10.4156/ijact.vol4.issue20.76

Google Scholar

[2] Shifei Ding, Weikuan Jia, Chunyang Su, Xiaoliang Liu, Jinrong Chen, "An Improved BP Neural Network Algorithm Based on Factor Analysis", JCIT, Vol. 5, No. 4, p.103 ~ 108, 2010.

DOI: 10.1109/iccet.2010.5485254

Google Scholar

[3] Changsheng Xiang, ZiYing Zhou, "A New Music Classification Method based on BP Neural Network", JDCTA, Vol. 5, No. 6, p.85 ~ 94, 2011.

Google Scholar

[4] Lijun Sang, Cui Jun, "Predicate Encryption for Security of Insider Intrusion Detection System", JDCTA, Vol. 5, No. 1, p.204 ~ 209, 2011.

DOI: 10.4156/jdcta.vol5.issue1.21

Google Scholar

[5] Peifeng Wang, Yue Hu, Li Li, "An Efficient Automaton Based Matching Algorithm and Its Application in Intrusion Detection System", IJACT, Vol. 3, No. 9, p.278 ~ 285, 2011.

DOI: 10.4156/ijact.vol3.issue9.34

Google Scholar

[6] Xin Li, Wenjie Wang, Jingchun Li, Xuefeng Zheng, Shaojie Wang, "Improving The Communication Resiliency of Distributed Intrusion Detection System", JCIT, Vol. 7, No. 21, p.550 ~ 558, 2012.

Google Scholar