Paper
4 August 2022 Network intrusion detection method based on one-dimensional CNN and GWO-SVM
Chen Chen, Yajiang Qi, Lintao Yang, Guanghua Wang, Xiaoyan Ye, Dan Wei
Author Affiliations +
Proceedings Volume 12306, Second International Conference on Digital Signal and Computer Communications (DSCC 2022); 123060V (2022) https://doi.org/10.1117/12.2641356
Event: Second International Conference on Digital Signal and Computer Communications (DSCC 2022), 2022, Changchun, China
Abstract
Most networks mainly use firewall and other devices to isolate from external networks. However, with the application of new technologies such as cloud computing and Internet of things, the degree of interconnection between networks is deepening, and the difficulty of security protection is greatly improved. How to effectively detect network intrusion has become very important. Compared with traditional intrusion detection technology, convolutional neural network has better ability to extract intrusion features. This paper proposes a network intrusion detection method based on one-dimensional convolutional neural network and grey wolf optimization algorithm to optimize support vector machine. Firstly, one-dimensional convolutional neural network is used to extract high-level features from intrusion detection data, and then support vector machine is used to classify and detect the extracted high-level features, in which the parameters of support vector are optimized by grey wolf optimization algorithm. Through simulation experiments, the proposed method can effectively improve the detection accuracy and model balance.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chen Chen, Yajiang Qi, Lintao Yang, Guanghua Wang, Xiaoyan Ye, and Dan Wei "Network intrusion detection method based on one-dimensional CNN and GWO-SVM", Proc. SPIE 12306, Second International Conference on Digital Signal and Computer Communications (DSCC 2022), 123060V (4 August 2022); https://doi.org/10.1117/12.2641356
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer intrusion detection

Convolution

Data modeling

Detection and tracking algorithms

Convolutional neural networks

Feature extraction

Evolutionary algorithms

Back to Top