Intrusion Detection Based on Feature Selection and Temporal Convolutional Network in Mobile Edge Computing Environment

被引:0
|
作者
Jiao, Xubin [1 ]
Li, Jinguo [1 ]
Wen, Mi [1 ]
机构
[1] Shanghai University of Electric Power, Shanghai,200090, China
关键词
Feature Selection - Convolution - Queueing networks - 5G mobile communication systems - Recurrent neural networks - Decision trees - Network security - Mobile edge computing;
D O I
10.6633/IJNS.20220324(2).11
中图分类号
学科分类号
摘要
As an inevitable trend of future 5G networks, Mobile Edge Computing (MEC) has many advantages in providing content awareness and cross-layer optimization services. But it also faces malicious traffic attacks from emerging services and technologies. Intrusion Detection Systems (IDS) is an effective defense mechanism to monitor and detect abnormal data on the host side or network side. However, as the focus of research in network security, IDS can usually be deployed separately without collaboration. The previous work on IDS is mainly based on Recurrent Neural Network (RNN) design. However, there are characteristics of limited edge node resources in the MEC scenario, making it challenging to deploy IDS for MEC. Secondly, these RNN-based methods are not effective in terms of detection accuracy. We proposed the model with Extreme Gradient Boosting Decision Tree and Temporal Convolutional Network (XGBoost-TCN) to solve these problems. In short, we used the XGBoost algorithm to reduce high-dimensional traffic to low-dimensional traffic. After that, we used a TCN model to detect abnormal traffic. The effectiveness and adaptability of the model have been verified on the public dataset. In addition, the results of performance evaluation show that the model has higher detection accuracy than previous related work for highly imbalanced abnormal traffic datasets © 2022. International Journal of Network Security. All Rights Reserved.
引用
收藏
页码:286 / 295
相关论文
共 50 条
  • [31] A Cascaded Feature Selection Approach in Network Intrusion Detection
    Sun, Yong
    Liu, Feng
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 119 - 124
  • [32] The Research of Intrusion Detection Feature Selection Method in Network
    Ye, Zheng-wang
    2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 30, 2014, 30 : 306 - 309
  • [33] A Quantum Feature Selection Method for Network Intrusion Detection
    Li, Mingze
    Zhang, Hongliang
    Fan, Lei
    Han, Zhu
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2022), 2022, : 281 - 289
  • [34] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
    Krishnaveni, S.
    Sivamohan, S.
    Sridhar, S. S.
    Prabakaran, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1761 - 1779
  • [35] Enhancing intrusion detection with feature selection and neural network
    Wu, Chunhui
    Li, Wenjuan
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (07) : 3087 - 3105
  • [36] Network intrusion detection through genetic feature selection
    Lee, Chi Hoon
    Shin, Sung Woo
    Chung, Jin Wook
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 109 - +
  • [37] Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
    S. Krishnaveni
    S. Sivamohan
    S. S. Sridhar
    S. Prabakaran
    Cluster Computing, 2021, 24 : 1761 - 1779
  • [38] A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
    Wang, Xingzhu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [39] UAV network intrusion detection method based on spatio-temporal graph convolutional network
    Chen Z.
    Lyu N.
    Chen K.
    Zhang Y.
    Gao W.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2021, 47 (05): : 1068 - 1076
  • [40] Vitality Based Feature Selection For Intrusion Detection
    Jupriyadi
    Kistijantoro, Achmad Imam
    2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014, : 93 - 96