首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 190 毫秒
1.
基于BP神经网络的手机病毒检测方法   总被引:1,自引:0,他引:1  
针对手机病毒的日益严重,而手机病毒检测技术不成熟的问题,提出了一种新的手机病毒检测方法,该方法基于手机病毒的工作原理和感染方式,把BP神经网络引入到计算机病毒防范检测中,创建了基于BP神经网络的手机病毒检测模型,通过病毒类型映射表来判断病毒类型,仿真结果表明:此方法能很好地检测已知病毒,对未知病毒也可作出一定的检测。  相似文献   

2.
基于集成神经网络的计算机病毒检测方法   总被引:2,自引:0,他引:2       下载免费PDF全文
在借鉴传统的特征扫描技术的基础上,提出了一种基于n-gram分析的计算机病毒自动检测方法。本文将基于信息增益的特征选择技术引入集成神经网络的构建中,结合Bagging算法,同时扰动训练数据和输入属性生成精确且差异度大的个体分类器,在此基础上以集成的 BP神经网络为模式分类器实现对病毒的检测。该法并不针对某一特定病毒,是一种通用的病毒检测器。实验表明提出的检测方法具有较强的泛化能力和较高的精确率。  相似文献   

3.
病毒技术历经半个世纪的发展,如今已不是单纯的病毒技术,而是融合了其他黑客等技术,因此当今病毒的危害性和传播速度远远超过了病毒原始形态。病毒的传染性以及病毒的变种技术在病毒上的应用使得病毒呈现一定的智能性。因此,为了应对病毒的变种技术以及病毒其他方面所呈现出的智能性,文中参考已有的检测病毒方法之后,提出了一种具有智能性的检测病毒的方法。文中使用沙箱作为检测病毒的运行环境,并使用BP神经网络作为检测病毒的工具,然后给出了一种具有一定智能性的病毒检测方法。该方法能够对被怀疑的非法变化的程序中是否存在病毒做出判断。  相似文献   

4.
研究网络对抗攻击中外部注入病毒检测问题.在网络对抗中,往往存在从外部人为注入的入侵病毒,病毒特征具有高伪装性,无法形成常规的识别特征,传统的病毒检测方法以固定病毒特征作为依据,一旦外部病毒特征不在其数据库内,将造成检测准确性下降的问题.提出基于RBF前馈式神经网络算法的网络对抗攻击中外部注入病毒检测方法.根据极值距离方法相关理论,能够计算外部注入病毒初始聚类中心,得到病毒检测的初始种群,通过迭代处理的方法获取种群中的差异个体.带入RBF神经网络结构,通过计算隐含层和输出层的输出结果,表示网络对抗攻击中外部注入病毒检测结果.实验结果表明,利用改进算法进行网络对抗攻击中外部注入病毒检测,可以提高检测的准确性.  相似文献   

5.
该文针对Win32PE病毒种类多,破坏力强的特点,提出一种基于神经网络集成的病毒检测方法。神经网络集成采用负相关学习方法进行训练,采用n-gram特征字统计方法得到病毒特征字,计算特征字信息条件熵,来选择作为训练样本的特征字。实验结果表明,神经网络集成改善了传统的特征字比对法不能识别新的病毒,容易被病毒制造者克服的缺点,在保证对Win32PE病毒较高的检测率的同时保持了较低的误检率。  相似文献   

6.
为解决已有病毒检测机制无法很好地处理大量未知病毒及深度网络模型难以部署在嵌入式设备上应用的问题,提出一种基于轻量级深度网络的计算机病毒检测方法.采用B2M算法将病毒映射为灰度图像,提取灰度共生矩阵GLCM作为轻量级深度网络SqueezeNet的输入,将传统视觉特征与深度神经网络进行整合,实现病毒的高准确率判别.对Squ...  相似文献   

7.
针对传统BP神经网络存在学习效率低、收敛速度慢和容易陷入局部极小值的问题,提出一种基于改进的PSO来优化BP神经网络的方法。通过在PSO算法中引入随机变化的加速常数来获得最优权值,对BP神经网络进行优化和训练,将优化的BP神经网络用于遗传高血压患病年龄的预测中。实验结果表明,该方法较好地解决了传统BP神经网络易陷入局部极小值的问题,提高了算法的收敛速度和稳定性。  相似文献   

8.
张澎  高守平  王鲁达 《计算机工程》2011,37(23):124-126
针对入侵检测的效率及准确性问题,提出一种基于量子遗传算法优化神经网络的入侵智能检测模型,该模型基于量子遗传算法的全局搜索和神经网络局部精确搜索特性,将量子遗传算法和BP算法有机结合。利用改进的量子遗传算法优化BP神经网络的权重和阈值,使BP神经网络能快速准确地识别入侵,增强计算机网络安全。运用Matlab软件对该模型进行仿真。实验结果表明,与其他同类方法相比,该方法的检测率更高、误报率更低。  相似文献   

9.
杨红涛  李俊松 《微机发展》2007,17(10):113-115
阐述了利用神经网络预测由连续自动回归(AR)马尔可夫模型所代表的可变位速率通信流量(VBR);在这一理论的基础上,介绍一个BP神经网络模型,它是采用拆分组装方法来构造一个学习结果达到均方根误差全局最小点的BP神经网络,该方法能有效克服局部极小点,缩短学习时间和减小学习难度;该BP神经网络能精确地预测VBR通信流量,从而实现ATM带宽动态分配。  相似文献   

10.
如今的病毒中部分病毒具有了自我变形能力。由于部分病毒能够自动的改变代码表达形式,因此现有的病毒检测算法在检测部分病毒时变得困难。为应对病毒出现的变形技术,病毒研究人员相继提出多种病毒的检测算法。本文的作者在查阅了与病毒相关的文献之后提出了一种新的变形病毒检测算法。该检测算法从判断程序行为的权值角度出发,并结合粒子群技术提出了一种具有一定智能性的病毒检测算法,该算法能够对现有的病毒检测算法有一定补充作用。  相似文献   

11.
In this paper, we present a new control system for the intelligent force control of multifingered robot grips which combines both fuzzy-based adaptation level and a neural-based one with a conventional PID-controller. The most attention is given to the neural-based force adaptation level implemented by three-layered back-propagation neural networks. A computer based simulation system for the peg-in-hole insertion task is developed to analyze the capabilities of the neural controllers. Their behaviour is discussed by comparing them to conventional and fuzzy-based force controllers performing the same task.  相似文献   

12.
In order to improve the learning ability of a forward neural network, in this article, we incorporate the feedback back-propagation (FBBP) and grey system theory to consider the learning and training of a neural network new perspective. By reducing the input grey degree we optimise the input of the neural network to make it more rational for learning and training of neural networks. Simulation results verified the efficiency of the proposed algorithm by comparing its performance with that of FBBP and classic back-propagation (BP). The results showed that the proposed algorithm has the characteristics of fast training and strong ability of generalisation and it is an effective learning method.  相似文献   

13.
为了克服BP神经网络速度慢、易陷入局部最小的缺点,利用GA的全局搜索能力优化BP神经网络权值,本文提出了遗传BP神经网络算法,并将其用于异常检测之中。在对Kddcup,99攻击数据进行分析和特征约简的基础上,设定了遗传BP神经网络算法的参数。实验结果表明,基于遗传BP神经网络异常检测模型的建立快于BP神经网络算法。  相似文献   

14.
A reference model approach to stability analysis of neural networks   总被引:8,自引:0,他引:8  
In this paper, a novel methodology called a reference model approach to stability analysis of neural networks is proposed. The core of the new approach is to study a neural network model with reference to other related models, so that different modeling approaches can be combinatively used and powerfully cross-fertilized. Focused on two representative neural network modeling approaches (the neuron state modeling approach and the local field modeling approach), we establish a rigorous theoretical basis on the feasibility and efficiency of the reference model approach. The new approach has been used to develop a series of new, generic stability theories for various neural network models. These results have been applied to several typical neural network systems including the Hopfield-type neural networks, the recurrent back-propagation neural networks, the BSB-type neural networks, the bound-constraints optimization neural networks, and the cellular neural networks. The results obtained unify, sharpen or generalize most of the existing stability assertions, and illustrate the feasibility and power of the new method.  相似文献   

15.
Ever growing Internet causes the availability of information. However, it also provides a suitable space for malicious activities, so security is crucial in this virtual environment. The network intrusion detection system (NIDS) is a popular tool to counter attacks against computer networks. This valuable tool can be realized using machine learning methods and intrusion datasets. Traditional datasets are usually packet-based in which all network packets are analyzed for intrusion detection in a time-consuming process. On the other hand, the recent spread of 1–10-Gbps-technologies have clearly pointed out that scalability is a growing problem. In this way, flow-based solutions can help to solve the problem by reduction of data and processing time, opening the way to high-speed detection on large infrastructures. Besides, NIDS should be capable of detecting new malicious activities. Artificial neural network-based NIDSs can detect unseen attacks, so a multi-layer perceptron (MLP) neural classifier is used in this study to distinguish benign and malicious traffic in a flow-based NIDS. In this way, a modified gravitational search algorithm (MGSA), as a modern heuristic technique, is employed to optimize the interconnection weights of the neural anomaly detector. The proposed scheme is trained using an enhanced version of the first labeled flow-based dataset for intrusion detection introduced in 2009. In addition, the particle swarm optimization (PSO) algorithm and traditional error back-propagation (EBP) algorithm are employed to train MLP, so performance comparison becomes possible. The experimental results based on the actual network data show that the MGSA-optimized neural anomaly detector is effective for monitoring abnormal traffic flows in the gigabytes traffic environment, and the accuracy is about 97.8 %.  相似文献   

16.
The automatic format-setting of journal articles for reducing the workload of computer users involves two processes: automatic acquisition of article format and automatic recall of article formal. Several neural networks have been explored to implement the two processes. The advantages and disadvantages of these neural networks are evaluated in comparison with capabilities of conventional computer programs. A heteroassociative back-propagation network has been developed for the automatic acquisition process. This network excels over computer programs because of its abilities in learning and generalizing implicit knowledge from examples. A bidirectional associative memory network, a Boltzman network, and an autoassociative back-propagation network have been investigated for the automatic recall process. None of them excel over computer programs in terms of recall accuracy.  相似文献   

17.
This paper presents a new approach for detecting defects in analog integrated circuits using a feed-forward neural network trained by the resilient error back-propagation method. A feed-forward neural network has been used for detecting faults in a simple analog CMOS circuit by representing the differences observed in power supply current of fault-free and faulty circuits. The identification of defects was performed in time and frequency domains, followed by a comparison of results achieved in both domains. We show that resilient back-propagation neural networks can be a very efficient and versatile approach for identifying defective analog circuits. Moreover, this approach is not limited to the supply current analysis, because it also offers monitoring of other circuit parameters. The type of defects detected by the resilient backpropagation neural networks, as well as other possible applications of this approach, are discussed.  相似文献   

18.
基于神经网络的非线性学习控制研究   总被引:3,自引:1,他引:2  
本文将多层前向传递神经网络应用于非线性系统控制,通过对神经网络的训练,实现非线性系统的状态反馈控制。本文还介绍了用神经网络控制一类非线性系统的学习控制算法,该算法对对象的数学模型依赖程度较低,为非线性系统的学习控制提供了一种有效的研究方法。另外还给出了该算法应用于几个不同非线性对象的学习控制仿真结果。  相似文献   

19.
首先回顾了计算视觉发展的历史,介绍了神经元、多层感知机和反向传播等人工神经网络的基本知识以及卷积神经网络的发展史及其卷积、池化等基本操作;讨论了AlexNet、VGGNet、GoogLeNet和ResNet等经典卷积神经网络结构,并重点介绍了CapsNet;总结了卷积神经网络在图像分类、语义分割、目标检测以及图像生成等领域的研究进展;最后提出了卷积神经网络研究所面临的挑战以及对CapsNet未来研究的展望。  相似文献   

20.
An inverse analysis method is proposed to simulate the A-scan ultrasonic nondestructive testing by means of back-propagation neural networks and computational mechanics. Both direct problem and inverse problem are considered in this study. In the direct problem, the frequency responses of a cracked medium subjected to an impact loading are calculated by the computational mechanics combining the finite element method with the boundary integral equation. The transient responses are obtained using fast Fourier transform. In the inverse problem, the back-propagation neural networks are trained by the characteristic parameters extracted from the various surface responses obtained from the direct problem. These surface responses carry a great deal of information about the structure of the medium with or without cracks. The trained neural networks are then utilized for the classification and identification of the crack in the medium to determine the type, location, and length of the crack.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号