An approach to network intrusion detection algorithm based on BP-HMM

被引:0
|
作者
Huang Guangqiu [1 ]
Ren Dayong [1 ]
机构
[1] Xian Univ Architect & Technol, Sch Management, Xian 710055, Shaanxi Prov, Peoples R China
关键词
back propagation-hidden Markov model; vector quantization; forward estimation algorithm; backward estimation algorithm; any-path method; intrusion detection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A network intrusion detection framework and its associated algorithm based on BP-HMM are put forward; the training and recognition methods of the algorithm are given. A sheer classifier based on HMM can't give attention to both the strong recognition ability for corresponding objects and maximization of difference lain in different models, so a BP neural network is used to provide state probability output for HMM in the HMM framework. Because of the coarse classification of BP, the limitation of HMM is overcome; the ability of classification and recognition is enhanced. Through the use of the any-path method, the accurate rate of recognition is not only improved, but also an obvious calculation predominance is obtained.
引用
收藏
页码:1321 / 1326
页数:6
相关论文
共 50 条
  • [21] Network intrusion detection algorithm based on deep neural network
    Jia, Yang
    Wang, Meng
    Wang, Yagang
    IET INFORMATION SECURITY, 2019, 13 (01) : 48 - 53
  • [22] Network Intrusion Detection Based on Sparse Autoencoder and IGA-BP Network
    Deng, Hongli
    Yang, Tao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [23] Anomaly intrusion detection method based on HMM
    Qiao, Y
    Xin, XW
    Bin, Y
    Ge, S
    ELECTRONICS LETTERS, 2002, 38 (13) : 663 - 664
  • [24] The Application of Improved BP Algorithm in Intrusion Detection
    He, Minwei
    Ma, Xuewei
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 213 - +
  • [25] Robust Intrusion Detection Algorithm Based on K-means and BP
    Zhong, Yangjun
    Zhang, Shuiping
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 634 - 638
  • [26] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [27] Quantum Evolutionary Algorithm Based Network Intrusion Detection
    Yin, Xiangdong
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 683 - 685
  • [28] AdaBoost-based algorithm for network intrusion detection
    Hu, Weiming
    Hu, Wei
    Maybank, Steve
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2008, 38 (02): : 577 - 583
  • [29] The Detection of Network Intrusion Based on Improved Adaboost Algorithm
    Wang, Quanmin
    Wei, Xuan
    2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020), 2020, : 84 - 88
  • [30] A Network Intrusion Detection Algorithm Based on FSA Model
    Wu, Fei
    Wu, Donghui
    Yang, Yingen
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 615 - 621