An approach to network intrusion detection algorithm based on BP-HMM

被引:0
|
作者
Huang Guangqiu [1 ]
Ren Dayong [1 ]
机构
[1] Xian Univ Architect & Technol, Sch Management, Xian 710055, Shaanxi Prov, Peoples R China
关键词
back propagation-hidden Markov model; vector quantization; forward estimation algorithm; backward estimation algorithm; any-path method; intrusion detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network intrusion detection framework and its associated algorithm based on BP-HMM are put forward; the training and recognition methods of the algorithm are given. A sheer classifier based on HMM can't give attention to both the strong recognition ability for corresponding objects and maximization of difference lain in different models, so a BP neural network is used to provide state probability output for HMM in the HMM framework. Because of the coarse classification of BP, the limitation of HMM is overcome; the ability of classification and recognition is enhanced. Through the use of the any-path method, the accurate rate of recognition is not only improved, but also an obvious calculation predominance is obtained.
引用
收藏
页码:1321 / 1326
页数:6
相关论文
共 50 条
  • [1] Research on Intrusion Detection Algorithm Based on BP Neural Network
    Qiu, Chunmin
    Shan, Jie
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 259 - 270
  • [2] Model of network intrusion detection system based on BP algorithm
    Wang, Y.
    Huang, G. X.
    Peng, D. G.
    ICIEA 2006: 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, PROCEEDINGS, 2006, : 659 - 662
  • [3] Intrusion Detection Based on BP Neural Network and Genetic Algorithm
    Zhao Jian-hua
    Li Wei-hua
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 438 - 444
  • [4] Model of network intrusion detection system based on BP algorithm
    Wang, Y.
    Huang, G. X.
    Peng, D. G.
    2006 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, 2006, : 139 - +
  • [5] Research and Implementation of Intrusion Detection Algorithm Based on BP Neural Network
    Wu, Zhenzhen
    PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 228 - 232
  • [6] Intrusion Detection Method of BP Neural Network Based on Crow Search Algorithm
    Lan Luying
    Tang Xianghong
    Gu Xin
    Lu Jianguang
    LASER & OPTOELECTRONICS PROGRESS, 2021, 58 (06)
  • [7] Misuse detection method of network intrusion based on HMM models
    Peng Zhu-Miao
    Zhang Zheng-Dao
    Bai Rul-Lin
    Zang Xian-Feng
    PROCEEDINGS OF THE 2007 CHINESE CONTROL AND DECISION CONFERENCE, 2007, : 694 - +
  • [8] Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network
    Lu, Xue
    Han, Dezhi
    Duan, Letian
    Tian, Qiuting
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 221 - 232
  • [9] Research on Intrusion Detection Based on BP Neural Network
    Chen, Haonan
    Liu, Yiyang
    Zhao, Jianming
    Liu, Xianda
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS AND COMPUTER ENGINEERING (ICCECE), 2021, : 79 - 82
  • [10] A software implementation of a genetic algorithm based approach to network intrusion detection
    Gong, RH
    Zulkernine, M
    Abolmaesumi, P
    SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERNG, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING AND FIRST AICS INTERNATIONAL WORKSHOP ON SELF-ASSEMBLING WIRELESS NETWORKS, PROCEEDINGS, 2005, : 246 - 253