2019
DOI: 10.2298/csis181001026d
|View full text |Cite
|
Sign up to set email alerts
|

Design of intrusion detection system based on improved ABC_elite and BP neural networks

Abstract: Intrusion detection is a hot topic in network security. This paper proposes an intrusion detection method based on improved artificial bee colony algorithm with elite-guided search equations (IABC elite) and Backprogation (BP) neural networks. The IABC elite algorithm is based on the depth first search framework and the elite-guided search equations, which enhance the exploitation ability of artificial bee colony algorithm and accelerate the convergence. The IABC elite algorithm is used to optimize the initial… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…This subsection shows of our framework's evaluation. We applied KDDTest+ and KDDTest-21 datasets and following different machine learning classifiers: Naive Bayes (NB) [34,35], Logistic Regression (LR) [36,37], Jrip (JR) [38], J48 Decision Tree (J48) [39], LMT Decision Tree (LMT), Random Forest (RF), Support Vector Machine (SMO) [40][41][42], K-Nearest Neighbors (IBK) [43,44]. All classifier machine learning methods are notified in Table 5.…”
Section: Proposed Framework Evaluationmentioning
confidence: 99%
“…This subsection shows of our framework's evaluation. We applied KDDTest+ and KDDTest-21 datasets and following different machine learning classifiers: Naive Bayes (NB) [34,35], Logistic Regression (LR) [36,37], Jrip (JR) [38], J48 Decision Tree (J48) [39], LMT Decision Tree (LMT), Random Forest (RF), Support Vector Machine (SMO) [40][41][42], K-Nearest Neighbors (IBK) [43,44]. All classifier machine learning methods are notified in Table 5.…”
Section: Proposed Framework Evaluationmentioning
confidence: 99%
“…Zhao and Li [8] used a real coding genetic algorithm to optimize the weights and threshold of BP neural network. Duan et al [9] got an IDS in which BP neural network is combined with improved artificial bee colony algorithm with elite-guided search equations. Yang et al [10] presented an LM-BP neural network model which optimizes the weight threshold of BP neural network.…”
Section: Introductionmentioning
confidence: 99%
“…In order to efficiently identify various types of attacks on networks, researchers have applied machine learning to intrusion detection. Common machine learning methods include Naïve Bayesian (NB) [2], back propagation (BP) [3], support vector machines (SVM) [4] and extreme learning machines (ELM) [5]. However, the intrusion detection of network data featuring high dimensions and more redundancies using a single machine learning method will result in reduced detection speed and accuracy.…”
Section: Introductionmentioning
confidence: 99%