Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Research on the Intrusion Detection Method Based on Machine LearningAlgorithm
Gansu University of Political Science and Law
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In recent years, "WannaCry" and other ransomware network security problems have emerged in an endless stream, causing immeasurable damage to the Internet. The network intrusion detection system plays an important role in protecting the computer as an effective second gate to make up the firewall against network threats. This article firstly introduces the definition and research sta- tus of intrusion detection. Secondly, it introduces the machine learning algorithms and their general processes for solving cyberspace security problems. The specific applications of machine learning in intrusion detection are introduced, especially random forest algo- rithm, Bayesian algorithm and other mainstream machine learning algorithms in the progress of intrusion detection; finally, the de- velopment direction of machine learning algorithms in intrusion detection systems is discussed.
Key wordsnetwork intrusion detection      machine learning      random forest      network security     
Published: 10 July 2020

Cite this article:

WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm. Computer & Telecommunication, 2020, 1(7): 1-3.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2020/V1/I7/1

[1] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[2] YANG Li-jia CHEN Xin-fang ZHAO Han-qing WANG Shi-wei. Water Quality Safety Modeling Prediction Based on Extra Tree Classifier[J]. 电脑与电信, 2024, 1(6): 57-.
[3] NIE Cheng WANG Jie.
A Review of Research and Development in Data Analysis Methods
[J]. 电脑与电信, 2024, 1(4): 200-25.
[4] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[5] GUO Zhao-feng XIE Ling ZHUANG Yi-fan.
Design of an Intelligent Blind Guide System
[J]. 电脑与电信, 2022, 1(3): 1-4.
[6] ZHANG Li.
Research on Macro Virus Processing Model Based on SVM Algorithm
[J]. 电脑与电信, 2022, 1(1-2): 41-45.
[7] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[8] ZHANG Chun LIU Chao LIU Xv-dong CHEN Zhi-hao JIANG Yong ZHANG Hui ZHOU Hui HU Jian-cun. Consumer Portrait Construction and Potential Consumer Mining Method in Business District[J]. 电脑与电信, 2021, 1(6): 79-86.
[9] LAI Jin-zhi.
Research and Practice of Network Security Management of Industrial Control System
Based on PDCA Circulation
[J]. 电脑与电信, 2021, 1(11): 12-15.
[10] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[11] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[12] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[13] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[14] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
[15] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd