Intrusion Detection Based on Feature Selection and Temporal Convolutional Network in Mobile Edge Computing Environment

被引:0
|
作者
Jiao, Xubin [1 ]
Li, Jinguo [1 ]
Wen, Mi [1 ]
机构
[1] Shanghai University of Electric Power, Shanghai,200090, China
关键词
Feature Selection - Convolution - Queueing networks - 5G mobile communication systems - Recurrent neural networks - Decision trees - Network security - Mobile edge computing;
D O I
10.6633/IJNS.20220324(2).11
中图分类号
学科分类号
摘要
As an inevitable trend of future 5G networks, Mobile Edge Computing (MEC) has many advantages in providing content awareness and cross-layer optimization services. But it also faces malicious traffic attacks from emerging services and technologies. Intrusion Detection Systems (IDS) is an effective defense mechanism to monitor and detect abnormal data on the host side or network side. However, as the focus of research in network security, IDS can usually be deployed separately without collaboration. The previous work on IDS is mainly based on Recurrent Neural Network (RNN) design. However, there are characteristics of limited edge node resources in the MEC scenario, making it challenging to deploy IDS for MEC. Secondly, these RNN-based methods are not effective in terms of detection accuracy. We proposed the model with Extreme Gradient Boosting Decision Tree and Temporal Convolutional Network (XGBoost-TCN) to solve these problems. In short, we used the XGBoost algorithm to reduce high-dimensional traffic to low-dimensional traffic. After that, we used a TCN model to detect abnormal traffic. The effectiveness and adaptability of the model have been verified on the public dataset. In addition, the results of performance evaluation show that the model has higher detection accuracy than previous related work for highly imbalanced abnormal traffic datasets © 2022. International Journal of Network Security. All Rights Reserved.
引用
收藏
页码:286 / 295
相关论文
共 50 条
  • [41] A Comparison of Feature Selection and Feature Extraction in Network Intrusion Detection Systems
    Vuong, Tuan-Cuong
    Tran, Hung
    Trang, Mai Xuan
    Ngo, Vu-Duc
    Van Luong, Thien
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1798 - 1804
  • [42] A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection
    Hamid, Yasir
    Sugumaran, M.
    Journaux, Ludovic
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 151 - 158
  • [43] An Improved Feature Selection Algorithm Based on MAHALANOBIS Distance for Network Intrusion Detection
    Zhao Yongli
    Zhang Yungui
    Tong Weiming
    Chen Hongzhi
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 69 - 73
  • [44] A robust network measurement and feature selection strategy for software-defined edge computing environment
    Zhang, Peiying
    Liu, Fanglin
    Vashisht, Sahil
    Singh Mann, Ravinder
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06):
  • [45] Linear Correlation-Based Feature Selection for Network Intrusion Detection Model
    Eid, Heba F.
    Hassanien, Aboul Ella
    Kim, Tai-hoon
    Banerjee, Soumya
    ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 240 - +
  • [46] Research on Feature Selection Method of Intrusion Detection Based on Deep Belief Network
    BaoyiWang
    Sun, Shan
    Zhang, Shaomin
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 556 - 561
  • [47] A novel combinatorial optimization based feature selection method for network intrusion detection
    Nazir, Anjum
    Khan, Rizwan Ahmed
    COMPUTERS & SECURITY, 2021, 102
  • [48] Signature based Network Intrusion Detection System using Feature Selection on Android
    Cyril, Onyedeke Obinna
    Elmissaoui, Taoufik
    Okoronkwo, M. C.
    Michael, Ihedioha Uchechi M.
    Ugwuishiwu, Chikodili H.
    Onyebuchi, Okwume B.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 551 - 558
  • [49] Feature fusion method based on spiking neural convolutional network for edge detection
    Xian, Ronghao
    Xiong, Xin
    Peng, Hong
    Wang, Jun
    Marrero, Antonio Ramirez de Arellano
    Yang, Qian
    PATTERN RECOGNITION, 2024, 147
  • [50] Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
    Fan W.
    Peng C.
    Zhu D.
    Wang Y.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 70 - 81