An Intrusion Detection Algorithm Based on Feature Graph

被引:9
|
作者
Yu, Xiang [1 ]
Tian, Zhihong [2 ]
Qiu, Jing [2 ]
Su, Shen [2 ]
Yan, Xiaoran [3 ]
机构
[1] Taizhou Univ, Sch Elect & Informat Engn, Taizhou 318000, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[3] Indiana Univ, Network Sci Inst, Bloomington, IN 47408 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 61卷 / 01期
基金
中国国家自然科学基金;
关键词
Intrusion detection; machine learning; ids; feature graph; grid partitions; DETECTION SYSTEM; ANOMALY DETECTION; FEATURE-SELECTION; DETECTION MODEL; NETWORK; CLASSIFIER; NIDS;
D O I
10.32604/cmc.2019.05821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few related studies focusing on both the effective detection for attacks and the representation for malicious behaviors with graph. In this paper, a novel intrusion detection approach IDBFG (Intrusion Detection Based on Feature Graph) is proposed which first filters normal connections with grid partitions, and then records the patterns of various attacks with a novel graph structure, and the behaviors in accordance with the patterns in graph are detected as intrusion behaviors. The experimental results on KDD-Cup 99 dataset show that IDBFG performs better than SVM (Supprot Vector Machines) and Decision Tree which are trained and tested in original feature space in terms of detection rates, false alarm rates and run time.
引用
收藏
页码:255 / 273
页数:19
相关论文
共 50 条
  • [1] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [2] Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection
    Prashanth S.K.
    Shitharth S.
    Praveen Kumar B.
    Subedha V.
    Sangeetha K.
    SN Computer Science, 3 (6)
  • [3] Firefly algorithm based feature selection for network intrusion detection
    Selvakumar, B.
    Muneeswaran, K.
    COMPUTERS & SECURITY, 2019, 81 : 148 - 155
  • [4] Feature selection for intrusion detection based on an improved rime optimization algorithm
    Peng, Qingyuan
    Wang, Xiaofeng
    Tang, Ao
    MCB Molecular and Cellular Biomechanics, 2024, 21 (03):
  • [5] Evolutionary Algorithm-based Feature Selection for an Intrusion Detection System
    Singh, Devendra Kumar
    Shrivastava, Manish
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (03) : 7130 - 7134
  • [6] A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
    Zhao, Fei
    Zhao, Jiyong
    Niu, Xinxin
    Luo, Shoushan
    Xin, Yang
    APPLIED SCIENCES-BASEL, 2018, 8 (09):
  • [7] Research on Intrusion Detection Algorithm of JRNB Nework Based on Feature Weighting
    Wang, Kunfu
    Xu, Shijun
    Zhang, Pengyi
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [8] Genetic Algorithm based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks
    Kannan, Anand
    Maguire, Gerald Q.
    Sharma, Ayush
    Schoo, Peter
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, : 416 - 423
  • [9] Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory
    Han, Ying
    Wang, Xinlei
    He, Mingshu
    Wang, Xiaojuan
    Guo, Shize
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17589 - 17601
  • [10] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256