基于量子遗传算法优化BP网络的入侵检测研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
入侵检测是近十年发展起来的一种动态监测、预防或抵御系统入侵行为的安全机制。目前入侵检测有许多模型和方法,而神经网络和模式识别等技术的引入使网络安全的智能检测研究成为热点。神经网络具有自学习、自适应的能力,只要提供系统的审计数据或网络数据包,神经网络就可以通过自学习从中提取正常的用户或系统活动特征模式,并检测出异常活动的攻击模式。这些特性使其在入侵检测中得到了很好的应用。
     目前最流行的神经网络学习算法是BP算法,BP学习算法是基于梯度下降这一本质,不可避免地会带来以下缺点:学习过程收敛速度慢;算法不完备,容易陷入局部极值,当学习速率设置过高时,可能产生振荡;鲁棒性差,网络性能对网络的初始设置比较敏感。这使得基于BP神经网络的入侵检测存在高漏报率和误报率,本文针对入侵检测的效率问题和准确性问题,提出了一种基于量子遗传算法优化BP神经网络的入侵检测模型,该模型基于量子遗传算法的全局搜索和BP网络局部精确搜索的特性,将量子遗传算法和BP算法有机结合,利用量子遗传算法优化BP神经网络的权重和阈值。针对基本量子遗传算法存在容易早熟和局部搜索能力弱等缺陷,提出了改进的量子遗传算法,并对量子遗传算法的各个环节进行了细致的分析与重新设计,包括量子比特编码、量子门更新、量子变异等。实验证明运用此方法可在一定程度上提高入侵检测的效率和准确性。
Intrusion detection is developed as a dynamic monitoring system to prevent or resist the intrusion of the security mechanism in the past decade.There are many intrusion detection models and methods, while the neural network and pattern recognition technologies enable the introduction of intelligent intrusion detection to become a hot research. Neural network has self-learning, adaptive capacity, as long as the system's audit data or network packets, neural networks can through self-study to extract the normal characteristics of the user or system activity patterns and detect unusual activity patterns of attack. These features make it applicate in intrusion detection very good.
     The most popular neural network learning algorithm is BP algorithm.However, it has the following drawbacks as the gradient descent property of the BP algorithm: the convergence speed is slow; the algorithm is incomplete and tends to get the local extreme; the algorithm can be oscillatory when the learning ratio is set too high; the algorithm is not robust and the network performance is sensive to the initial configuration of the network. All of these drawbacks can lead to the high omission rate and false alarm rate when BP algorithm is applied in instrusion detection. This paper presented an instrusion detection model based on quantum genetic algorithm and BP neural network, which can deal these phenomenoms propertly. The model takes advantage of the global search property of the quantum genetic algorithm and the exact local search characteristics of the BP network. The weight and the thresholds of the BP neural network is optimized by the quantum genetic algorithm.As basic quantum genetic algorithm has weeklocal search ability and is easy to premature, this paper also proposed an improved quantum genetic algorithm. Many aspects of the algorithm have been re-designed with considerately analysis including the quantum bit encoding, fitness function design, update quantum gates, quantum variations, etc.Experiments show that this method can be used to improve the efficiency and accuracy of intrusion detection.
引文
[1] Denning De. An intrusion Detection Model . IEEE Trans on Software Engineering, 1987,139(2): 222-232
    [2]林果园,黄皓,张永平.入侵检测系统研究进展.计算机科学,2008,35(2): 69-74
    [3]唐勇,卢锡城,王勇军.攻击特征自动提取技术综述.通信学报,2009,30(2): 96-105
    [4] B Mukherjee, L T, Heberlein Levitt. Network Intrusion Detection. IEEE Network, 2004,8(3): 26-41
    [5]卿斯汉,蒋建春,马恒太等.入侵检测技术研究综述.通信学报,2004,7(3): 19-29
    [6]刘衍珩,田大新,余雪岗等.基于分布式学习的大规模网络入侵检测算法.软件学报,2008,19(4): 993-1003
    [7] Jingwen Tian, Meijuan Gao. Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network. In: International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC '09). Los Alamitos, CA, USA : IEEE Computer Society, 2009, 619-622
    [8] Anderson JP.Computer security thread monitoring and surveillance. Hanscom AFB MA:United States Air Force Electronics System Division Fort Washington, PA: Jame P Anderson Co, 1980, 99-108
    [9] S.E.Smaha. Haystack: An Intrusiion Detection System.In: Proceedings of IEEE Fourth Aerospace Computer Security Application Conference. Orlando: IEEE Computer Society,1988, 79-95
    [10] El-Semary, A., Edmonds, J.,Gonzalez-Pino, J. Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection. In: Information Assurance Workshop. Los Alamitos, CA, USA : 2006 IEEE,2006, 100-107
    [11] Zhenwei Yu, Tsai, J.J.P et al. An Automatically Tuning Intrusion Detection System.Systems, Man, and Cybernetics, Part B, IEEE Transactions on,2007,37(2): 373-384
    [12] Parikh, D, Tsuhan Chen.Data Fusion and Cost Minimization for Intrusion Detection. Information Forensics and Security, IEEE Transactions on,2008, 3(3): 381-389
    [13] Chen, L,Leneutre, J. Game Theoretical Framework onIntrusion Detection inHeterogeneous Networks.Information Forensics and Security, IEEE Transactionson,2009,4(2): 165-178
    [14]姚越鹏,钟求喜.基于代理的分级MANET入侵检测系统.计算机工程,2009,35(3): 192-194
    [15]李闻,戴英侠,连一峰等.基于混杂模型的上下文相关主机入侵检测系统.软件学报,2009,20(1): 138-151
    [16]江子扬.基于遗传算法的入侵检测系统的研究:[硕士学位论文].哈尔滨:哈尔滨理工大学,2004, 35-42
    [17]李子健.遗传算法的改进及其在入侵检测系统中的应用:[硕士学位论文].天津:天津大学,2003, 45-48
    [18]向碧群.基于遗传算法的入侵检测系统研究:[硕士学位论文].重庆:重庆大学,2005, 44-50
    [19]张名段,王方伟,张玉澎等.协同进化遗传算法及其应用.计算机工程,2004,15(2):67-88
    [20]张凤斌,杨永田,江子扬.遗传算法在基于网络异常的入侵检测中的应用.电子学报.2004,32(5): 875-877
    [21]郭慧玲,唐勇,张冬丽.遗传算法在入侵检测规则提取中的应用.哈尔滨工业大学学报,2009,41(1): 248-250
    [22]许朋飞,沈磊.改进BP算法在入侵检测系统中的应用.计算机工程,2008,34(6):151-152
    [23]彭志豪,李冠宇.分布式入侵检测系统研究综述.微电子学与计算机,2006,23(9):191-192,196
    [24]李旭芳,王士同.基于QPSO训练支持向量机的网络入侵检测.计算机工程与设计,2008,29(1):34-36
    [25]曾志强,杨向荣,沈钧毅.模糊数据挖掘和遗传算法在入侵检测中的应用.计算机应用研究,2004,(21)4: 95-97
    [26]刘明川,彭长生.混合型入侵检测系统的研究.计算机工程与设计,2009,30(3):547-551
    [27]曾夏玲,梁艳招,彭雅丽等.基于簇的无线传感器网络入侵检测系统.微电子学与计算机,2008,25(6): 156-158,163
    [28]刘俊强,铙元,霍华.入侵检测系统IDS的安全性研究.计算机应用研究,2003,11(5): 69-72
    [29]唐正军,李建华.入侵检测技术.北京:清华大学出版社,2004, 35-58
    [30]孙小涓,孙凝晖,陈明宇.多核平台上B-NIDS的优化.计算机研究与发展,2007,44(10): 1733-1740.
    [31]杨义先,钮心忻.网络安全理论与技术.北京:人民邮电出版社,2003, 42-55
    [32]罗守山.入侵检测.北京:北京邮电大学出版社,2004, 36-51
    [33]戴英侠,连一峰等.系统安全与入侵检测.北京:清华大学出版社,2002, 40-57
    [34]李效锋.符合CIDF标准的入侵检测系统研究:[硕士学位论文].杭州:浙江大学,2002, 34-50
    [35] DENNING DE.An intrusion Detection Model.IEEE Transctions on Software Engineering,1987,139(2): 222-232
    [36] D.Denning.An intrusion-detection model. IEEE Transactions on Software Engineering,1987,13(2): 222-232
    [37] Heberlein L T. A network security monitor.In: Proceeding of the IEEE Symposium on Research in Security and Privacy.Oakland, CA: IEEE, 1990, 296-304
    [38] Ludmila Goroshko.2003 CSI/FBI Computer Crime and Security Survey. www.crime-research.org,2004-06-01
    [39] CERT Coordination Center. Carnegie Mellon University. CERT/CC Overview Incident and Vulnerability Trends. CERT. Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 2003,3(4): 1523--3890,
    [40] S.Kumar,E.Spafford.A pattern matching model for misuse intrusion detection.In:Proceedings of the 17th National Computer Security Conference. London: Computer Security press,1994, 11-21
    [41]王艳秋,赵昭灵,兰巨龙.一种基于IPv6的网络入侵检测系统.计算机应用研究,2007,45(2): 142-144
    [42] P.Porras, R.Kemmerer.Penetration state transition analysis-a rule-based intrusion detection approach.In: Proc.8 annual.Computer Security Applications Conf. Los Alamitos, CA, USA :IEEE Transactions on Software Engineering,1992, 220-229
    [43] BONIFACIO J M,CANSIAN A M,CARVALHO A C,et al.Neural Networks Applied in Intrusion Detection System.In: Proc of the IEEE World Congress on Computational Intelligence(WCCI’98). Oakland, CA: IEEE Computer Society Press,1998, 205-210
    [44] Forrest S, Hofmey S,Somayaji.A computer immunology. Communications of the ACM,1997,40(10): 88-96
    [45]戴云,范平志.入侵检测系统研究综述.计算机工程与应用,2002,36(4): 17-19
    [46]齐建东,基于数据挖掘的入侵检测方法及系统研究:[硕士学位论文].北京:中国农业大学,2003, 52-68
    [47] Wenke Lee, Sal Stolfo.Data mining approaches for intrusion detection.In:Proceedings of the Seventh USENIX Security Symposium(SECURITY'98).SanAntonio,TX: Security Symposium Press,1998, 155-168
    [48] LANE T, CARLAE B.An Empirical Study of Two Approaches to SequenceLearning for Anomaly Detection.Machine Learning,2003,51(1): 71-107
    [49] Wenke Lee.A data mining framework for constructing features and models forintrusion detection system,PhD Thesis.Columbia University,2000, 46-57
    [50]梁铁柱.入侵检测中的数据挖掘方法研究: [硕士学位论文].北京:中国人民解放军理工大学,2002, 43-48
    [51]陈署宇,周辉毅.分布式自治型入侵检测系统研究.计算机工程与应用,2007,33(6): 139-140
    [52] Phillip A.Porras, Peter G. Neumann. EMERALD: event monitoring enablingresponses to anomalous live disturbance.In: National Information SystemsSecurity Conf.Baltimore MD: Information Systems Security,1997, 88-106
    [53] R. P. Feynman. Simulating physics with computers. Int J TheorPhys,1982, 21(6&7): 467-488
    [54] D. Deutsch. Quantum theory, the Church-Turing principle and the universalquantum computer.In: Proceedings of the Royal Society.London:Series A,Mathematical and Physical Sciences,1985, 97-117
    [55] Peter W. Shor. Algorithms for quantum computation: Discrete logarithms andfactoring.In: Proc of the 35th Annu. Symp. Foundations of Computer Science.New Mexico: IEEE Computer Society Press,1994, 124-134
    [56] Kuk-hyun Han , Student Member , Jong-hwan Kim.Quantum-inspiredevolutionary algorithm for a class of combinatorial optimization.In:IEEE Trans.Evolutionary Computation.Los Alamitos, CA, USA : IEEE Computer Society2002, 580-593
    [57] T. Hey.Quantum computing: An introduction.In: Computing & ControlEngineering Journal. Piscataway, NJ: IEEE Press, 1999, 105-112
    [58] K.-H. Han,J.-H Kim.Genetic quantum algorithm and its application tocombinatorial optimization problem.In: Proc. IEEE International Congress onEvolutionary Computation.Los Alamitos, CA, USA:IEEE Computer Society2000, 1354-1360
    [59]张葛祥,金炜东.量子遗传算法改进及其应用研究.西南交通大学学报,2003,38(6):718-722
    [60]张葛祥,李娜,金炜东等.一种新量子遗传算法及其应用.电子学报,2004,35(3):78-82
    [61]杨俊安,解光军,庄镇泉等.量子遗传算法及其在图像盲分离中的应用研究.计算机辅助设计与图形学学报,2003,33(7): 56-61
    [62]杨俊安,庄镇泉.量子遗传算法研究现状.计算机科学,2003,30(11): 33-35
    [63]熊焰,陈欢欢,苗付友等,一种解决组合优化问题的量子遗传算法QGA.电子学报,2004,32(11): 1855-1858
    [64]易晓梅,陈波,蔡家楣.入侵检测的进化神经网络研究.计算机工程,2009,35(2):208-209,213
    [65]牛建强,曹元大.基于数据挖掘的IDS日志数据分析处理.计算机应用研究,2003(9): 82-84
    [66]肖立中,邵志清,马汉华等.网络入侵检测中的自动决定聚类数算法.软件学报,2008,19(8): 2140-2148
    [67] Zhenwei Yu, Tsai, J.J.P, Weigert, T. An Automatically Tuning IntrusionDetection System.Systems, Man, and Cybernetics, Part B, IEEE Transactionson.2007,37(2): 373-384
    [68] Parikh, D, Tsuhan Chen. Data Fusion and Cost Minimization for IntrusionDetection.Information Forensics and Security, IEEE Transactions on.2008, 3(3):381-389
    [69] Chen L, Leneutre J. Game Theoretical Framework on Intrusion Detection inHeterogeneous Networks .Information Forensics and Security, IEEETransactions on.2009,4(2): 165-178
    [70] Shun, J, Malki H A.Network Intrusion Detection System Using NeuralNetworks.In: Natural Computation, 2008. ICNC '08. Fourth InternationalConference on.Los Alamitos, CA, USA: Natural Computation,2008, 242-246
    [71] Song Guangjun, Zhang Jialin, Sun Zhenlong. The Research of Dynamic ChangeLearning Rate Strategy in BP Neural Network and Application in NetworkIntrusion Detection.In: 3rd International Conference on Innovative ComputingInformation and Control (ICICIC '08). Los Alamitos, CA, USA: IEEE ComputerSociety,2008, 513-513
    [72] KDD Cup 1999 Data set [EB/OL]:http://archive.ics.uci.edu/ml/databases/kddcup99
    [73]陈晓梅.入侵检测中的数据预处理问题研究.计算机科学,2006,33(1): 81-83
    [74]徐仙伟,叶小岭.遗传算法优化BP网络初始权重用于入侵检测.计算机应用研究,2005,22(3): 127-128,132
    [75]肖晓丽,黄继红,刘志朋.基于MPSO的BP网络及其在入侵检测中的应用.计算机工程,2008,34(15): 168-169,210
    [76] Wang Huiran, Ma Ruifang. Optimization of Neural Networks for Network Intrusion Detection. In: First International Workshop on Education Technology and Computer Science(ETCS '09). Los Alamitos, CA, USA : IEEE Computer Society,2009, 418-420

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700