Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network intrusion detection method based on data mining

A network intrusion detection and data mining technology, applied in digital data information retrieval, electronic digital data processing, special data processing applications, etc. overhead, the effect of improving the classification speed

Active Publication Date: 2019-06-04
HANGZHOU DIANZI UNIV
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a network intrusion based on data mining for the problems of the classification accuracy rate reduction caused by the sample weight update defect in the traditional Adaboost algorithm, and the slow classification speed and high calculation overhead caused by redundant weak classifiers. The detection method is an adaptive boosting method based on improved weight updating and selective integration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network intrusion detection method based on data mining
  • A network intrusion detection method based on data mining
  • A network intrusion detection method based on data mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with accompanying drawing.

[0049] Such as figure 1 , a network intrusion detection method based on data mining, the specific steps are as follows:

[0050] Step (1) Use the Adaboost algorithm of the improved weight update method for weak classifier training:

[0051] Step (1.1) sets the initial training set as D={(x 1 ,y 1 ),(x 2 ,y 2 ),...,(x N ,y N )}, N is the total number of samples in the training set; initialize the weight of the training sample: the initial weight of each training sample is 1 / N, and the initial weight vector is {1 / N,1 / N,...,1 / N}.

[0052] Step (1.2) train T weak classifiers, the training method of the tth weak classifier is as follows, 1≤t≤T:

[0053] Step (1.2.1) Randomly select N training samples from the initial training set D with replacement according to the sample weights, as the t-th weak classifier h t The training set D t ;

[0054] Step (1.2.2) according...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network intrusion detection method based on data mining. In the prior art, problems that the classification accuracy is reduced due to the defect of sample weight updating,the classification speed is low due to a redundant weak classifier, and the calculation cost is high exist. According to the method, in the weak classifier training stage, the Adaboost algorithm of the improved weight updating method is adopted for weak classifier training, the sample weights are updated according to the weighted average accuracy of all samples in previous t times of training, infinite expansion of the noise sample weights is restrained, and weight updating of all the samples is more balanced. In a weak classifier combination stage, a new mode for measuring the similarity between weak classifiers is provided; selective integration is performed based on the similarity measurement mode and the hierarchical clustering algorithm, weak classifiers with the similarity exceedinga threshold value are classified into one class, the weak classifier with the highest classification accuracy in each class is selected to be combined into a strong classifier, and therefore redundantweak classifiers are removed, the classification speed is increased, and calculation expenditure is reduced.

Description

technical field [0001] The invention belongs to the technical field of computers, in particular to the technical field of network security, and relates to a network intrusion detection method based on data mining. Background technique [0002] As an important part of the information security system structure, intrusion detection can collect information from several key points in the network system, and analyze whether there are intrusion behaviors and signs in the network. Intrusion detection can be regarded as a data classification process, identifying normal operation and intrusion behavior from the collected information. Currently, intrusion detection and classification algorithms mainly include decision trees, neural networks, or support vector machines. However, the above classifiers are all single classifiers, their generalization ability is insufficient, and the classification accuracy is not high, so the ensemble learning method is introduced. Ensemble learning is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/2458G06K9/62
Inventor 王秋华欧阳潇琴詹佳程吕秋云
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products