2019
DOI: 10.3390/sym11030380
|View full text |Cite
|
Sign up to set email alerts
|

Key Feature Recognition Algorithm of Network Intrusion Signal Based on Neural Network and Support Vector Machine

Abstract: When identifying the key features of the network intrusion signal based on the GA-RBF algorithm (using the genetic algorithm to optimize the radial basis) to identify the key features of the network intrusion signal, the pre-processing process of the network intrusion signal data is neglected, resulting in an increase in network signal data noise, reducing the accuracy of key feature recognition. Therefore, a key feature recognition algorithm for network intrusion signals based on neural network and support ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…Cloud computing is applied to process massive data in a short time on the distributed parallel computing basis, and has strong network service ability (Kim and Jeong, 2017). Achieving efficient resource management has always been the most concerned issue for cloud service operators and providers (Khalilpourazari and Khalilpourazary, 2018;Ye et al, 2019;Mehrabi et al, 2021). Cloud load prediction is necessary for efficient network regulation in the cloud environment (Xu et al, 2017).…”
Section: A Cloud Load Forecasting Model With Nonlinear Changes Using Whale Optimization Algorithm Hybrid Strategy -Extreme Learning Machimentioning
confidence: 99%
“…Cloud computing is applied to process massive data in a short time on the distributed parallel computing basis, and has strong network service ability (Kim and Jeong, 2017). Achieving efficient resource management has always been the most concerned issue for cloud service operators and providers (Khalilpourazari and Khalilpourazary, 2018;Ye et al, 2019;Mehrabi et al, 2021). Cloud load prediction is necessary for efficient network regulation in the cloud environment (Xu et al, 2017).…”
Section: A Cloud Load Forecasting Model With Nonlinear Changes Using Whale Optimization Algorithm Hybrid Strategy -Extreme Learning Machimentioning
confidence: 99%
“…The SVM algorithm also is used as a powerful classification tool for cancer genomic classification [31]. In addition to the single algorithm, a combination classification schema of SVM with other methods is applied to improve convective and stratiform classification, including random forest [32], logistic repression [33], neural network [34], etc. For the popularization of high-dimensional data, the SVM is employed to construct a classification model based on the feature selection or extraction method [1], [35], [36].…”
Section: Related Workmentioning
confidence: 99%
“…Time domain analysis technique is easy to implement and independent to rotating speed. Frequency domain analysis technique is superior to time domain analysis technique for early-stage and distributed faults [28][29][30][31]. Therefore, we employ eight statistical parameters including kurtosis, crest factor, variance, standard deviation, RMS, skewness, mean and impulse indicator [32] expressed as follows to implement the preprocessing of time domain and frequency domain signals.…”
Section: Multiple Modalities Features Of Multichannel Vibration Signalmentioning
confidence: 99%