An evolutionary computation-based machine learning for network attack detection in big data traffic

被引:6
|
作者
Wang, Yan [1 ,2 ,3 ]
Zhang, Haifeng [1 ,2 ,3 ]
Wei, Yongjun [3 ,4 ]
Wang, Huan [1 ,2 ,3 ]
Peng, Yong [1 ,2 ,3 ]
Bin, Zhiyan [1 ,2 ,3 ]
Li, Weilong [1 ,2 ,3 ]
机构
[1] Guangxi Univ Sci & Technol, Sch Comp Sci & Technol, Liuzhou 545000, Guangxi, Peoples R China
[2] Liuzhou Key Lab Big Data Intelligent Proc & Secur, Liuzhou 545000, Guangxi, Peoples R China
[3] Guangxi Educ Syst Network Secur Monitoring Ctr, Liuzhou 545000, Guangxi, Peoples R China
[4] Liuzhou Railway Vocationa Tech Coll, Liuzhou 545000, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack identification; Evolution computation -based machine; learning; LightGBM; Big data traffic;
D O I
10.1016/j.asoc.2023.110184
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Big data scenarios are characterized by multiple devices, massive traffic, and high data dimensionality. In the process of attack identification, the selection of features from massive data directly affects the attack detection effect and has become a key issue that constrains attack identification. Therefore, this paper proposes an evolutionary computation-based machine learning approach for detecting network attacks in big data traffic. First, the RandomSample-SMOTE (Synthetic Minority Over-sampling Technique) method is designed to perform class imbalance processing on network attack traffic collected from big data traffic; second, the feature importance of the attack traffic in different classification layers is calculated and ranked separately using the LightGBM (Light Gradient Boosting Machine) model, and the optimal feature values are selected through retraining; finally, the obtained feature values are used for model training and the most optimal model is obtained by optimizing the hyperparameters with TuneGridSearchCV (Tune's Grid Search Cross Validation). The results of simulation experiments show that the method in this paper can effectively extract features from big data traffic. It can effectively reduce feature dimensionality, significantly improve detection accuracy and save about 40% of computation time compared with existing methods.& COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Evolutionary computation-based machine learning for Smart City high-dimensional Big Data Analytics
    Li, Xiaoming
    Zhang, Dan
    Zheng, Ye
    Hong, Wuyang
    Wang, Weixi
    Xia, Jizhe
    Lv, Zhihan
    APPLIED SOFT COMPUTING, 2023, 133
  • [2] An Evolutionary Computation-Based Federated Learning for Host Intrusion Detection in Real-Time Traffic Analysis
    Suresh, A.
    Dwarakanath, B.
    Nanda, Ashok Kumar
    Santhosh Kumar, P.
    Sankar, S.
    Cheerla, Sreevardhan
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [3] Evolutionary computation-based reliability quantification and its application in big data analysis on semiconductor manufacturing
    Xu, Qiao
    Yu, Naigong
    Hasan, Mohammad Mehedi
    APPLIED SOFT COMPUTING, 2023, 136
  • [4] Editorial: Evolutionary computation-based machine learning and its applications for multi-robot systems
    Ma, Lianbo
    FRONTIERS IN NEUROROBOTICS, 2023, 17
  • [5] Traffic data extraction and labeling for machine learning based attack detection in IoT networks
    Gebrye, Hayelom
    Wang, Yong
    Li, Fagen
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2023, 14 (07) : 2317 - 2332
  • [6] Traffic data extraction and labeling for machine learning based attack detection in IoT networks
    Hayelom Gebrye
    Yong Wang
    Fagen Li
    International Journal of Machine Learning and Cybernetics, 2023, 14 : 2317 - 2332
  • [7] Evolutionary computation-based self-supervised learning for image processing: a big data-driven approach to feature extraction and fusion for multispectral object detection
    Shen, Xiaoyang
    Li, Haibin
    Shankar, Achyut
    Viriyasitavat, Wattana
    Chamola, Vinay
    JOURNAL OF BIG DATA, 2024, 11 (01)
  • [8] COMPUTATION-BASED TRAFFIC MANAGEMENT SYSTEM
    Buliali, Joko Lianto
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND SYSTEMS (ICTS), 2017, : 3 - 5
  • [9] Network Traffic Classification for Attack Detection Using Big Data Tools: A Review
    Al-Araji, Zaid. J.
    Ahmad, Sharifah Sakinah Syed
    Al-Salihi, Mustafa W.
    Al-Lamy, Hayder A.
    Ahmed, Mohammed
    Raad, Wisam
    Yunos, Norhazwani Md
    INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 : 355 - 363
  • [10] Special issue on evolutionary computation-based methods and applications for data processing
    Liu, Weidong
    Sreedevi, A. G.
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (36): : 24959 - 24960