An Intrusion Detection Algorithm Based on Feature Graph

被引:9
|
作者
Yu, Xiang [1 ]
Tian, Zhihong [2 ]
Qiu, Jing [2 ]
Su, Shen [2 ]
Yan, Xiaoran [3 ]
机构
[1] Taizhou Univ, Sch Elect & Informat Engn, Taizhou 318000, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[3] Indiana Univ, Network Sci Inst, Bloomington, IN 47408 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 61卷 / 01期
基金
中国国家自然科学基金;
关键词
Intrusion detection; machine learning; ids; feature graph; grid partitions; DETECTION SYSTEM; ANOMALY DETECTION; FEATURE-SELECTION; DETECTION MODEL; NETWORK; CLASSIFIER; NIDS;
D O I
10.32604/cmc.2019.05821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few related studies focusing on both the effective detection for attacks and the representation for malicious behaviors with graph. In this paper, a novel intrusion detection approach IDBFG (Intrusion Detection Based on Feature Graph) is proposed which first filters normal connections with grid partitions, and then records the patterns of various attacks with a novel graph structure, and the behaviors in accordance with the patterns in graph are detected as intrusion behaviors. The experimental results on KDD-Cup 99 dataset show that IDBFG performs better than SVM (Supprot Vector Machines) and Decision Tree which are trained and tested in original feature space in terms of detection rates, false alarm rates and run time.
引用
收藏
页码:255 / 273
页数:19
相关论文
共 50 条
  • [21] A feature selection algorithm towards efficient intrusion detection
    Yin, Chunyong
    Ma, Luyu
    Feng, Lu
    Yin, Zhichao
    Wang, Jin
    International Journal of Multimedia and Ubiquitous Engineering, 2015, 10 (11): : 253 - 264
  • [22] Cyber intrusion detection by combined feature selection algorithm
    Mohammadi, Sara
    Mirvaziri, Hamid
    Ghazizadeh-Ahsaee, Mostafa
    Karimipour, Hadis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 80 - 88
  • [23] A Novel Algorithm for Feature Selection Used in Intrusion Detection
    Hao, Yongle
    Hou, Ying
    Li, Longjie
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 967 - 974
  • [24] Recursive Feature Elimination Algorithm for Intrusion Detection Systems
    Hang Duy Thi Nguyen
    2022 7TH INTERNATIONAL CONFERENCE ON BUSINESS AND INDUSTRIAL RESEARCH (ICBIR2022), 2022, : 216 - 220
  • [25] Feature selection using a genetic algorithm for intrusion detection
    Helmer, G
    Wong, J
    Honavar, V
    Miller, L
    GECCO-99: PROCEEDINGS OF THE GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 1999, : 1781 - 1781
  • [26] Multi-classification algorithm based on graph convolutional neural network for intrusion detection
    Ruiyan Du
    Minghui Huang
    Fulai Liu
    Signal, Image and Video Processing, 2025, 19 (6)
  • [27] An intrusion detection method based on graph theory
    Bao, Zhen
    He, Di
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (09): : 1176 - 1180
  • [28] Random Feature Graph Neural Network for Intrusion Detection in Internet of Things
    Luo, Guoyu
    Wang, Xueshun
    Dai, Jinyou
    Computer Engineering and Applications, 60 (21): : 264 - 273
  • [29] An effective genetic algorithm-based feature selection method for intrusion detection systems
    Halim, Zahid
    Yousaf, Muhammad Nadeem
    Waqas, Muhammad
    Sulaiman, Muhammad
    Abbas, Ghulam
    Hussain, Masroor
    Ahmad, Iftekhar
    Hanif, Muhammad
    COMPUTERS & SECURITY, 2021, 110
  • [30] A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection
    Ren, Min
    Wang, Zhihao
    Zhao, Peiying
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 278 - 299