基于深度学习的入侵检测记录一

写在开头

  刚上研究生,老师初期打算安排给我基于深度学习的入侵检测课题。我打算以博客的形式记录自己的学习历程,一来勉励自己,二来加深印象。
  学习一项新的知识,首先要培养自己的兴趣,其次要明白自己想要了解的问题是什么。我们从最表面的问题入手,首先了解什么是深度学习,为什么要有深度学习,如何使用深度学习。

深度学习概述(是什么)

  alpha Go 赢得围棋比赛在前段时间被无数次提起,它能够通过大量的训练数据学习到下围棋的技巧,这是如何实现的呢?再来一个简单的例子,很多手机都有照片分类的功能,软件可以将手机中拍摄的照片进行精确的自动分类,这又是如何实现的?
  看完这些我们会有什么想法呢?深度学习可能是这样一种东西,它通过大量的数据来找到一些规律,得到一个最优的结论。对不对呢?我们看下维基对深度学习的定义。

深度学习(deep leaning)是机器学习拉出的分支,它试图使用包含复杂结构或由多重非线性变换构成的多个处理层对数据进行高层抽象的算法

太专业了对吗?我们来理解一下这段话。
  首先,什么是机器学习,就是设计和分析一些可以让计算机自动学习的算法。那么什么是处理层?再来看维基后面的一段话。

深度学习进一步假定这一相互作用的过程可分为多个层次,代表对观测值的多层抽象。不同的层数和层的规模可用于不同程度的抽象。深度学习运用了这分层次抽象的思

  • 5
    点赞
  • 23
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Abstract— With the increasing number of computers being connected to the Internet, security of an information system has never been more urgent. Because no system can be absolutely secure, the timely and accurate detection of intrusions is necessary. This is the reason of an entire area of research, called Intrusion Detection Systems (IDS). Anomaly systems detect intrusions by searching for an abnormal system activity. But the main problem of anomaly detection IDS is that; it is very difficult to build, because of the difficulty in defining what is normal and what is abnormal. Neural network with its ability of learning has become one of the most promising techniques to solve this problem. This paper presents an overview of neural networks and their use in building anomaly intrusion systems. Keywords- Intrusion Detection Systems; Neural Network; Anomaly Detection I. INTRODUCTION Companies and government agencies dependence on computer networks has never been more critical, and probability of attacks with devastating consequences has never been higher, hence the need for protection is becoming no less critical. Good network security suite should not only be able to detect attacks or recover from attack but should also have fast reactionary capabilities. Hacker, attacking from inside as an authorized user or from outside as an intruder, uses vulnerabilities or flaws on a system. It is therefore important to have a tool that monitors activity of users with intent of detecting malicious activities. This important part of network security is called Intrusion Detection System (IDS).

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值