Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2008-06
Add to Favorite Get Latest Update

Application of Improved BP Algorithm in Intrusion Detection System

XU Peng-fei, SHEN Lei (Computer College, Shandong University, Jinan 250061)  
An improved BP algorithm is proposed,in the algorithm,the learning rate α is not given by experts, but the best value is computed during learning. The experimental results indicate that this improved algorithm can increase learning speed and shorten training time. have become a part of security infrastructures. As high false alarm rate exists in current network intrusion detection systems, this improved algorithm can improve the intrusion detection rate.
【CateGory Index】: TP393.08;TP183
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 WANG Yan-pin(Dept.of Information Engineering,Zhengzhou Railway Vocational & Technical College,Zhengzhou 450052,China);Genetic tabu algorithm for BP network intrusion detection[J];Application Research of Computers;2010-03
Chinese Journal Full-text Database 2 Hits
1 WEI Shengjun, HU Changzhen, JIANG Fei (Network Security Technique Laboratory, Beijing Institute of Technology, Beijing 100081);An Intrusion Detection Method Based on Improved BP Neural Network Algorithm[J];Computer Engineering;2005-13
2 (The School of Electric Engineering, Zhengzhou U-niversity , Zhengzhou, China 450002)Li , DongmeiWang, Jie;Application of Neural Network in Intrusion Detection System[J];Control & Automation;2005-20
Chinese Journal Full-text Database 10 Hits
1 LI Kai1,TIAN Shuang-liang1,GENG Li-jun2(1.Institute of Computer and Information Engineering,Northwest University for Nationalities,Lanzhou 730030,China;2.School of Accounting,Shanxi University of Finance and Economics,Taiyuan 030006,China);Feature selection of intrusion detection system based on BP neural network[J];Journal of Changchun University;2009-06
2 GUO Xu-zhan,SUN Yan-ge(Computer and Information Technology College,Xinyang Normal University,Xinyang 464000,China);Research of Intrusion Detection Based on Neural Network Optimized and Genetic Algorithm[J];Computer Knowledge and Technology;2009-29
3 BAO Hui, QIN Jie, ZHANG Xing-hong (Henan University of Information Science and Engineering, Zhengzhou, Henan 450052,China);The Application of BP-Neural Network in the Intrusion Detection[J];Computer Security;2010-03
4 Cui Yuan, Yang Bo, Ge Ning (School of Telecommunications Engineering, Xidian University, Xi′ an 710071, China);ART-2 Neural Network and Its Application in IDS[J];;2006-12
5 Du Xu Ling Jie Luo Xiongchang(Faculty of Computer Science,Guangdong University of Technology,Guangzhou 510090,Guangdong,China);A METHOD OF NETWORK INTRUSION DETECTION BASED ON HIDDEN MARKOV MODELS[J];Computer Applications and Software;2008-03
6 Ma Haifeng Song Jingfeng Zhou Wenjun(Heilongjiang Institute of Science Technology,Harbin 150027,Heilongjiang,China);ON RBF INTRUSION DETECTION MODEL BASED ON MATLAB[J];Computer Applications and Software;2009-06
7 HU Hai-feng,ZHAO Kai(Pindingshan University,Pingdingshan 467000,He'nan,China);The Research of Improved BP Neural Network In Intrusion Detection[J];Journal of Kashgar Teachers College;2009-03
8 FAN BINGQI WANG WENJUAN(The School of Electric Engineering,Zhengzhou University, Zhengzhou,China 450002)Du,Guanghui Wang,Jie;Application of the Kalman Filter in Intrusion Detection System[J];;2006-33
9 ZENG JIE CHEN HUABIN;The Implementation of MultiAgent Network Intrusion Detection System Based on CPN[J];;2006-36
10 WU SHIFEN ZHANG YINGCHAO LIU YUHUA;An Improved Research on AHP Scale System and its Application to the Evaluation of IDS[J];;2007-09
Chinese Journal Full-text Database 10 Hits
1 TANG De-yao, LI Hui, SONG Xin-hui, HUANG Gui-fa(R&D Center of Beijing Tangzhi Science & Technology Development Co.,Ltd.,The 608 Research Institute of Aircraft Industry, Zhuzhou 412002, China);Failure diagnosis and analysis of locomotive bearings[J];Electric Locomotives & Mass Transit Vehicles;2005-04
2 Li Bo (CPC Party Member School,Luohu District,Shenzhen 518003,China);Challenge and Future Trend of Intrusion Detection Technology[J];Electronic Science and Technology;2007-07
3 ZHANG Ge-xiang 1,LI Na 1,JIN Wei-dong 1,HU Lai-zhao 2 (1 School of Electrical Engineering,Southwest Jiaotong University,Chengdu,Sichuan 610031,China; 2 China Electronic Technology Group Corporation No.29 Research Institute,Chengdu,Sichuan 610036,China);A Novel Quantum Genetic Algorithm and Its Application[J];Acta Electronica Sinica;2004-03
4 ZHANG Feng-bin 1,2,YANG Yong-tian1,JIANG Zi-yang2 (1 College of Computer Science and Technology,Harbin Engineering University,Harbin,Heilongjiang 150001,China; 2 Computer and Control College,Harbin University of Science and Technology,Harbin,Heilongjiang 150080,China);Genetic Algorithms in Intrusion Detection Based on Network Anomaly[J];Acta Electronica Sinica;2004-05
5 XIONG Yan,CHEN Huan-huan,MIAO Fu-you,WANG Xing-fu (Dept.of Computer Science and Technology,University of Science and Technology of China,Hefei,Anhui 230027,China);A Quantum Genetic Algorithm to Solve Combinatorial Optimization Problem[J];Acta Electronica Sinica;2004-11
6 WEI Yong-hong LI Tian-zhi ZHANG Zhi (Hebei Mechatronics Intermediate Pilot Production Base,Shijiazhuang Hebei 050081,China);The discussion of Network information security defensive system[J];Journal of the Hebei Academy of Sciences;2006-01
7 GUO Hui-ling1,TANG Yong2,ZHANG Dong-li2(1.Dept.of Information Engineering,Environmental Management College of China,Qinhuangdao 066004,China;2.College of Information Science and engineering,YanShan University,Qinhuangdao 066004,China);Application of genetic algorithm in rule extraction of intrusion detection[J];Journal of Harbin Institute of Technology;2009-01
8 ZHAO Ming-yuan1, ZHU Heng-jun2 (1. Development Department, Datong Electric Locomotive Co., Ltd., Datong, Shanxi 037038, China; 2. School of Mechanical, Electronic and Control Engineering, Beijing Jiaotong University, Beijing 100044, China);Fault diagnosis and prediction system of locomotive bearing[J];Electric Drive For Locomotives;2005-05
9 Sun Xiaojuan1,2,3,Sun Ninghui1,2,and Chen Mingyu1,21(National Research Center for Intelligent Computing Systems,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080)2(Key Laboratory of Computer System and Architecture,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080)3(School of Information Science and Engineering,Graduate University of Chinese Academy of Sciences,Beijing 100049);Optimization of B-NIDS for Multicore[J];Journal of Computer Research and Development;2007-10
10 Dai Yun Fan Pingzhi (Communication&Network Security Research and Application Center,Southwest Jiaotong University,Chengdu610031);An Overview on the Intrusion Detection System[J];Computer Engineering and Applications;2002-04
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 JIANG Jian chun,\ MA Heng tai,\ REN Dang en,\ QING Si han(Engineering Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijng 100080, China) E mail: jianchun@ercist.iscas.ac.cn http://www.ercist.ac.cn;A Survey of Intrusion Detection Research on Network Security[J];Journal of Software;2000-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved