Paper
12 January 2023 Embedded architecture protocol network intrusion detection based on deep residual learning
Rongping Wang
Author Affiliations +
Proceedings Volume 12509, Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022); 125092M (2023) https://doi.org/10.1117/12.2655931
Event: Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022), 2022, Guangzhou, China
Abstract
Blockchain Embedded Architecture Protocol network is affected by homomorphic disturbance of nodes in routing and forwarding control, and is vulnerable to embedded intrusion. In order to improve the security of the network, an intrusion detection algorithm based on deep residual learning for Blockchain Embedded Architecture Protocol network is proposed. The statistical feature model of blockchain embedded architecture protocol network intrusion is constructed. The edge information fusion technology of association rules is used to detect and filter the intrusion features of blockchain embedded architecture protocol network, and the spectral features of blockchain embedded architecture protocol network data are extracted. The depth residual learning method is used to carry out the adaptive optimization control in the intrusion detection process of blockchain embedded architecture protocol network, and the multi-threshold depth residual fusion method is used to realize the accurate detection of abnormal traffic data and improve the ability to accurately locate and detect intrusions. The simulation results show that this method has a high accuracy probability, good detection performance and improved network security.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rongping Wang "Embedded architecture protocol network intrusion detection based on deep residual learning", Proc. SPIE 12509, Third International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI 2022), 125092M (12 January 2023); https://doi.org/10.1117/12.2655931
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network architectures

Computer intrusion detection

Data modeling

Statistical modeling

Computer architecture

Detection and tracking algorithms

Feature extraction

RELATED CONTENT

Network intrusion detection method based on GrC-CVM
Proceedings of SPIE (December 21 2023)
Network anomaly detection based on ensemble learning
Proceedings of SPIE (December 28 2022)
Data mining model and algorithm in IDS
Proceedings of SPIE (April 15 2004)

Back to Top