基于麻雀搜索算法优化的神经网络入侵检测研究

Yue Li, Yunfa Huang, Peiting Xu, Zengjin Liu
{"title":"基于麻雀搜索算法优化的神经网络入侵检测研究","authors":"Yue Li, Yunfa Huang, Peiting Xu, Zengjin Liu","doi":"10.1109/ICCECE58074.2023.10135379","DOIUrl":null,"url":null,"abstract":"In recent years, due to the impact of the COVID-19, most people work from home and study online, resulting in a surge in internet traffic. At the same time, cyber attacks are occurring more frequently. As the second firewall of the system, intrusion detection system can help users discover security threats in time and take corresponding measures through network data monitoring and various alarm mechanisms. To improve the intrusion detection system, a proposal has been made to optimize back propagation neural network using the sparrow search algorithm. This model uses Min-Max scaling and Borderline SMOTE oversampling algorithm to preprocess data, and uses tent map to initialize the population of sparrow search algorithm. Finally, compared with other traditional machine learning models, we choose recall as the core indicator, precision as the secondary indicator, and f1_score as the auxiliary indicator. Experimental results indicate that our model exhibits an improved recall and f1_score, indicating that our model exhibits superior performance in intrusion detection.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research of Intrusion Detection Based on Neural Network Optimized by Sparrow Search Algorithm\",\"authors\":\"Yue Li, Yunfa Huang, Peiting Xu, Zengjin Liu\",\"doi\":\"10.1109/ICCECE58074.2023.10135379\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, due to the impact of the COVID-19, most people work from home and study online, resulting in a surge in internet traffic. At the same time, cyber attacks are occurring more frequently. As the second firewall of the system, intrusion detection system can help users discover security threats in time and take corresponding measures through network data monitoring and various alarm mechanisms. To improve the intrusion detection system, a proposal has been made to optimize back propagation neural network using the sparrow search algorithm. This model uses Min-Max scaling and Borderline SMOTE oversampling algorithm to preprocess data, and uses tent map to initialize the population of sparrow search algorithm. Finally, compared with other traditional machine learning models, we choose recall as the core indicator, precision as the secondary indicator, and f1_score as the auxiliary indicator. Experimental results indicate that our model exhibits an improved recall and f1_score, indicating that our model exhibits superior performance in intrusion detection.\",\"PeriodicalId\":120030,\"journal\":{\"name\":\"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCECE58074.2023.10135379\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCECE58074.2023.10135379","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,受新冠肺炎疫情影响,大多数人在家办公、在线学习,互联网流量激增。与此同时,网络攻击也越来越频繁。入侵检测系统作为系统的第二道防火墙,通过网络数据监控和各种报警机制,帮助用户及时发现安全威胁并采取相应的措施。为了改进入侵检测系统,提出了一种利用麻雀搜索算法对反向传播神经网络进行优化的方法。该模型采用Min-Max缩放和Borderline SMOTE过采样算法对数据进行预处理,并采用帐篷图初始化麻雀种群搜索算法。最后,与其他传统机器学习模型相比,我们选择召回率作为核心指标,精度作为次要指标,f1_score作为辅助指标。实验结果表明,该模型具有较好的召回率和f1_score,表明该模型在入侵检测中具有较好的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Research of Intrusion Detection Based on Neural Network Optimized by Sparrow Search Algorithm
In recent years, due to the impact of the COVID-19, most people work from home and study online, resulting in a surge in internet traffic. At the same time, cyber attacks are occurring more frequently. As the second firewall of the system, intrusion detection system can help users discover security threats in time and take corresponding measures through network data monitoring and various alarm mechanisms. To improve the intrusion detection system, a proposal has been made to optimize back propagation neural network using the sparrow search algorithm. This model uses Min-Max scaling and Borderline SMOTE oversampling algorithm to preprocess data, and uses tent map to initialize the population of sparrow search algorithm. Finally, compared with other traditional machine learning models, we choose recall as the core indicator, precision as the secondary indicator, and f1_score as the auxiliary indicator. Experimental results indicate that our model exhibits an improved recall and f1_score, indicating that our model exhibits superior performance in intrusion detection.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Clutter Edge and Target Detection Method Based on Central Moment Feature Adaptive short-time Fourier transform based on reinforcement learning Design and implementation of carrier aggregation and secure communication in distribution field network Power data attribution revocation searchable encrypted cloud storage Research of Intrusion Detection Based on Neural Network Optimized by Sparrow Search Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1