Network Intrusion Detection Based on IPSO-BPNN
نویسندگان
چکیده
منابع مشابه
Intrusion Detection Scheme based on IPSO-RBF
In order to overcome the separately selection advantages of traditional feature and RBF neural network parameter, increase accuracy rate of network’s intrusion detection, there came up with a research on neural network intrusion detection of improved particle swarm optimization. According to optimize the feature selection of network and RBF neural network parameter, established a neural network...
متن کاملResearch on Key Technology of Network Intrusion Detection System Based on Improved GA-BPNN Algorithm
In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks. The intense demand for electronic commerce has intensified the growth of hacking incidents. Network security is a systematic concept, and the effective security policy or scheme is the primary goal of network information security. ...
متن کاملNetwork Intrusion Detection based on GMKL Algorithm
According to the 31th statistical reports of China Internet network information center (CNNIC), by the end of December 2012, the number of Chinese netizens has reached 564 million, and the scale of mobile Internet users also reached 420 million. But when the network brings great convenience to people's life, it also brings huge threat in the life of people. So through collecting and analyzing t...
متن کاملNetwork Intrusion Detection Based on PSO-SVM
In order to improve network intrusion detection precision, this paper proposed a network intrusion detection model based on simultaneous selecting features and parameters of support vector machine (SVM) by particle swarm optimization (PSO) algorithm. Firstly, the features and parameters of SVM are coded to particle, and then the PSO is used to find the optimal features and SVM parameters by col...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2013
ISSN: 1812-5638
DOI: 10.3923/itj.2013.2719.2725