Skip to main content

Study and Application of BP Neural Network in Intrusion Detection

  • Conference paper
  • First Online:
Proceedings of the 2012 International Conference on Cybernetics and Informatics

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 163))

Abstract

Network security is the foundation to safeguard work concerning network, but various events and means to threaten network security have emerged one after another. As an effective auxiliary means in traditional security technology, the intrusion detection system has become a research hotspot in the field of computer system and network security. This paper has studied the basic algorithm of BP neural network, and adopted the improved LM-BP algorithm to design the intrusion detection system. Through comparison and analysis we find that compared with traditional algorithm of BP neural network, the algorithm of BP neural network not only has higher execution efficiency, its false alarm rate and error rate of intrusion detection are also lower than other detection methods, which has important significance to safeguard network security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sun Yani, Wang Xinfang, Chen Xinhua (2009) Ensemble classification system based on intrusion detection of neural network. Comput Eng Des 5(4):63–67

    Google Scholar 

  2. Li Gang (2010) Application of improved BP network in intrusion detection. Chongqing Univ Sci Technol J (Sci ed) 1(6):51–54

    Google Scholar 

  3. Bu-Qing CAO, Jian-Xun LIU, Bin Wen (2012) Currency characteristic extraction and identification research based on PCA and BP neural network. JCIT 7(2):38–44

    Google Scholar 

  4. Junxin Shen, Songjiang Wang (2012) The application of neural network in build-operate-transfer project risk control. AISS 4(1):93–99

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwei Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Zhao, Z. (2014). Study and Application of BP Neural Network in Intrusion Detection. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_49

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3872-4_49

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3871-7

  • Online ISBN: 978-1-4614-3872-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics