An Intrusion Detection Algorithm Based on Feature Graph

被引:9
|
作者
Yu, Xiang [1 ]
Tian, Zhihong [2 ]
Qiu, Jing [2 ]
Su, Shen [2 ]
Yan, Xiaoran [3 ]
机构
[1] Taizhou Univ, Sch Elect & Informat Engn, Taizhou 318000, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[3] Indiana Univ, Network Sci Inst, Bloomington, IN 47408 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 61卷 / 01期
基金
中国国家自然科学基金;
关键词
Intrusion detection; machine learning; ids; feature graph; grid partitions; DETECTION SYSTEM; ANOMALY DETECTION; FEATURE-SELECTION; DETECTION MODEL; NETWORK; CLASSIFIER; NIDS;
D O I
10.32604/cmc.2019.05821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few related studies focusing on both the effective detection for attacks and the representation for malicious behaviors with graph. In this paper, a novel intrusion detection approach IDBFG (Intrusion Detection Based on Feature Graph) is proposed which first filters normal connections with grid partitions, and then records the patterns of various attacks with a novel graph structure, and the behaviors in accordance with the patterns in graph are detected as intrusion behaviors. The experimental results on KDD-Cup 99 dataset show that IDBFG performs better than SVM (Supprot Vector Machines) and Decision Tree which are trained and tested in original feature space in terms of detection rates, false alarm rates and run time.
引用
收藏
页码:255 / 273
页数:19
相关论文
共 50 条
  • [41] An Intrusion Detection Algorithm Based on NFPA
    Zhong Anming
    Yang Hongyu
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 328 - 331
  • [42] Application of a New Feature Generation Algorithm in Intrusion Detection System
    Niu, Yingchun
    Chen, Chengdong
    Zhang, Xuehua
    Zhou, Xiaoguang
    Liu, Hongjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] Genetic algorithm with Different Feature Selection Method for Intrusion Detection
    Cleetus, Nimmy
    Dhanya, K. A.
    2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 220 - 225
  • [44] Adaptive Intrusion Detection Algorithm based on Learning Algorithm
    Kim, Dae-Wook
    Yang, Jae-Won
    Sim, Kwee-Bo
    IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 3, 2004, : 2229 - 2233
  • [45] Research on Intrusion Detection Based on Feature Extraction of Autoencoder and the Improved K-means Algorithm
    Wang, Xingang
    Wang, Linlin
    2017 10TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2017, : 352 - 356
  • [46] The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection
    Alsaleh, Alanoud
    Binsaeedan, Wojdan
    IEEE ACCESS, 2021, 9 : 112466 - 112477
  • [48] Improving the Feature Set in IoT Intrusion Detection Problem Based on FP-Growth Algorithm
    Le Thi Hong Van
    Pham Van Huong
    Le Duc Thuan
    Nguyen Hieu Minh
    PROCEEDINGS OF 202013TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2020), 2020, : 18 - 23
  • [49] Improving intrusion detection in the IoT with African vultures optimisation algorithm-based feature selection
    Alweshah, Mohammed
    Alhebaishan, Ghadeer Ahmad
    Kassaymeh, Sofian
    Alkhalaileh, Saleh
    Ababneh, Mohammed
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2024, 16 (03)
  • [50] ResACAG: A graph neural network based intrusion detection
    Zhang, Anqin
    Zhao, Yan
    Zhou, Chenhao
    Zhang, Ting
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 122