Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network Intrusion Detection Method Based on Data Mining

A technology of network intrusion detection and data mining, which is applied in digital data information retrieval, electronic digital data processing, special data processing applications, etc., can solve the problems of reduced classification accuracy, high computing overhead, and slow classification speed, and achieve reduced computing Overhead, the effect of increasing classification speed

Active Publication Date: 2021-03-16
HANGZHOU DIANZI UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a network intrusion based on data mining for the problems of the classification accuracy rate reduction caused by the sample weight update defect in the traditional Adaboost algorithm, and the slow classification speed and high calculation overhead caused by redundant weak classifiers. The detection method is an adaptive boosting method based on improved weight updating and selective integration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network Intrusion Detection Method Based on Data Mining
  • Network Intrusion Detection Method Based on Data Mining
  • Network Intrusion Detection Method Based on Data Mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings.

[0049] like figure 1 , a network intrusion detection method based on data mining, the specific steps are as follows:

[0050] Step (1) Use the Adaboost algorithm with the improved weight update method to train the weak classifier:

[0051] Step (1.1) Let the initial training set be D={(x 1 ,y 1 ),(x 2 ,y 2 ),...,(x N ,y N )}, N is the total number of samples in the training set; initialized weights of training samples: the initial weight of each training sample is 1 / N, and the initial weight vector is {1 / N,1 / N,…,1 / N }.

[0052] Step (1.2) train T weak classifiers. The training method of the t-th weak classifier is as follows, 1≤t≤T:

[0053] Step (1.2.1) randomly select N training samples from the initial training set D according to the sample weights, as the t-th weak classifier h t The training set D t ;

[0054] Step (1.2.2) According to the training set...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network intrusion detection method based on data mining. In the prior art, problems that the classification accuracy is reduced due to the defect of sample weight updating,the classification speed is low due to a redundant weak classifier, and the calculation cost is high exist. According to the method, in the weak classifier training stage, the Adaboost algorithm of the improved weight updating method is adopted for weak classifier training, the sample weights are updated according to the weighted average accuracy of all samples in previous t times of training, infinite expansion of the noise sample weights is restrained, and weight updating of all the samples is more balanced. In a weak classifier combination stage, a new mode for measuring the similarity between weak classifiers is provided; selective integration is performed based on the similarity measurement mode and the hierarchical clustering algorithm, weak classifiers with the similarity exceedinga threshold value are classified into one class, the weak classifier with the highest classification accuracy in each class is selected to be combined into a strong classifier, and therefore redundantweak classifiers are removed, the classification speed is increased, and calculation expenditure is reduced.

Description

technical field [0001] The invention belongs to the technical field of computers, in particular to the technical field of network security, and relates to a network intrusion detection method based on data mining. Background technique [0002] As an important part of the information security assurance architecture, intrusion detection can collect information from several key points in the network system, and analyze whether there are intrusion behaviors and signs in the network. Intrusion detection can be viewed as a data classification process to identify normal operations and intrusion behaviors from the collected information. Currently, intrusion detection classification algorithms mainly include decision trees, neural networks or support vector machines. However, the above classifiers are all single classifiers, their generalization ability is insufficient, and the classification accuracy is not high, so the ensemble learning method is introduced. Ensemble learning is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F16/2458G06K9/62
Inventor 王秋华欧阳潇琴詹佳程吕秋云
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products