A network intrusion detection method based on data mining
A network intrusion detection and data mining technology, applied in digital data information retrieval, electronic digital data processing, special data processing applications, etc. overhead, the effect of improving the classification speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The present invention will be further described below in conjunction with accompanying drawing.
[0049] Such as figure 1 , a network intrusion detection method based on data mining, the specific steps are as follows:
[0050] Step (1) Use the Adaboost algorithm of the improved weight update method for weak classifier training:
[0051] Step (1.1) sets the initial training set as D={(x 1 ,y 1 ),(x 2 ,y 2 ),...,(x N ,y N )}, N is the total number of samples in the training set; initialize the weight of the training sample: the initial weight of each training sample is 1 / N, and the initial weight vector is {1 / N,1 / N,...,1 / N}.
[0052] Step (1.2) train T weak classifiers, the training method of the tth weak classifier is as follows, 1≤t≤T:
[0053] Step (1.2.1) Randomly select N training samples from the initial training set D with replacement according to the sample weights, as the t-th weak classifier h t The training set D t ;
[0054] Step (1.2.2) according...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com