Research on classification and recognition of attacking factors based on radial basis function neural network
- 194 Downloads
In order to identify the network attack elements better, and solve the nonlinear data multi-classification problem of the network attack elements, this paper presents a classification model and training method based on radial basis neural network. The model uses the training sample error to construct the cost function to solve the minimum value of the cost function and improve the classification accuracy. In the training process of the model, the K-mean algorithm is improved by constructing the average difference between the samples, the number of the hidden layer nodes and the initial value of the basis function center are determined, and the influence of the hidden layer structure on the classification accuracy is reduced. The learning rate in the gradient algorithm is optimized by Q learning method, and the interference of the learning rate to the training of the network parameters is reduced. The OLS algorithm is used to adjust the weights of the hidden layer to the output layer to improve the accuracy of the model classification output. The simulation results show that the model can solve the nonlinear classification problem of network attack well, and the average accuracy rate is improved by about 9% compared with the existing classification methods.
KeywordsRadial basis function Neural network Attacking elements Nonlinear data multi-classification
This work was supported in part by Key Science and Technology Project of Jilin Province (20160204019GX) and National High-tech R&D (863) Program of China (2015AA015701).
- 5.Jinna, L., Bai, Y.P.: Research and simulation on RBFNN optimized by particle swarm algorithm. Appl. Mech. Mater. 303, 1431–1434 (2013)Google Scholar
- 9.Yan, G.H., Lee, R., Kent A., et al.: Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In: CCS’12 Proceedings of the 2012 ACM Conference on Computer and Communications Security. USA:ACM, pp. 553–566 (2012)Google Scholar
- 11.Aleroud, A., Karabatis, G., Sharma, P., He, P.: Context and semantics for detection of cyber attacks. J. Inf. Comput. Sec. 6(1), 63–92 (2014)Google Scholar
- 13.Bateni, M., Baraani, A., Ghorbani, A.A.: Using artificial immune system and fuzzy logic for alert correlation. J. Netw. Sec. 15, 160–174 (2013)Google Scholar
- 15.Han, L.Y., Gao, B., Yang, L.: Study of temperature compensation for laser gyro SINS of land-based missile. Tactical Missile Technol. 4, 81–85 (2013)Google Scholar
- 16.Shen, J., Miao, L.J., Wu, J.W.: Application and compensation for startup phase of FOG based on RBF neural network. Infrared Laser Eng. 42, 119–124 (2013)Google Scholar
- 22.Wang, Y.: Research on network security situation prediction based on Markov game theory. Int. J. Sec. Its Appl. 9, 301–308 (2016)Google Scholar