An Intrusion Detection Algorithm Based on Feature Graph

被引:9
|
作者
Yu, Xiang [1 ]
Tian, Zhihong [2 ]
Qiu, Jing [2 ]
Su, Shen [2 ]
Yan, Xiaoran [3 ]
机构
[1] Taizhou Univ, Sch Elect & Informat Engn, Taizhou 318000, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[3] Indiana Univ, Network Sci Inst, Bloomington, IN 47408 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 61卷 / 01期
基金
中国国家自然科学基金;
关键词
Intrusion detection; machine learning; ids; feature graph; grid partitions; DETECTION SYSTEM; ANOMALY DETECTION; FEATURE-SELECTION; DETECTION MODEL; NETWORK; CLASSIFIER; NIDS;
D O I
10.32604/cmc.2019.05821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few related studies focusing on both the effective detection for attacks and the representation for malicious behaviors with graph. In this paper, a novel intrusion detection approach IDBFG (Intrusion Detection Based on Feature Graph) is proposed which first filters normal connections with grid partitions, and then records the patterns of various attacks with a novel graph structure, and the behaviors in accordance with the patterns in graph are detected as intrusion behaviors. The experimental results on KDD-Cup 99 dataset show that IDBFG performs better than SVM (Supprot Vector Machines) and Decision Tree which are trained and tested in original feature space in terms of detection rates, false alarm rates and run time.
引用
收藏
页码:255 / 273
页数:19
相关论文
共 50 条
  • [31] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [32] New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems
    Kherbache, Meriem
    Espes, David
    Amroun, Kamal
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2020, 2021, 12637 : 3 - 19
  • [33] A research and application of feature selection based on KNN and Tabu search algorithm in the intrusion detection
    Zhang, Hao
    Tao, Ran
    Li, Zhi-Yong
    Cai, Zhen-He
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (07): : 1628 - 1632
  • [34] Vitality Based Feature Selection For Intrusion Detection
    Jupriyadi
    Kistijantoro, Achmad Imam
    2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014, : 93 - 96
  • [35] Residual Network Feature Fusion Tracking Algorithm Based on Graph Salience Detection
    Jin Hui
    Li Xinyang
    LASER & OPTOELECTRONICS PROGRESS, 2020, 57 (18)
  • [36] Weighted feature extraction using a genetic algorithm for intrusion detection
    Middlemiss, MJ
    Dick, G
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 1669 - 1675
  • [37] Intrusion detection using Highest Wins feature selection algorithm
    Rami Mustafa A. Mohammad
    Mutasem K. Alsmadi
    Neural Computing and Applications, 2021, 33 : 9805 - 9816
  • [38] Intrusion detection using Highest Wins feature selection algorithm
    Mohammad, Rami Mustafa A.
    Alsmadi, Mutasem K.
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (16): : 9805 - 9816
  • [39] An intrusion intention analysis algorithm based on attack graph
    Zhu Z.
    Chai G.
    International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 643 - 650
  • [40] An Intrusion Detection Algorithm Based On NFPA
    Zhong Anming
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 491 - 497