Fusing network traffic features with host traffic features for an improved 5G network intrusion detection system

被引:0
|
作者
Alars, Estabraq Saleem Abduljabbar [1 ]
Kurnaz, Sefer [1 ]
机构
[1] Altinbas Univ, Inst Sci, Dept Elect & Comp Engn, Istanbul, Turkey
来源
OPTIK | 2022年 / 271卷
关键词
Intrusion; Cluster; Detection; Wireless; Fusion; Network; Traffic; Monitoring; Nodes; FEATURE-SELECTION APPROACH; SUPPORT VECTOR MACHINE; HYBRID; CLASSIFIER; ENSEMBLE; PCA;
D O I
10.1016/j.ijleo.2022.170079
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The point of this original high level examination is to perform melding network traffic highlights with have traffic highlights for a superior organization interruption discovery framework in Wireless Network (WN). The WNs are made out of a few sensors which are haphazardly or deterministically dispersed for information procurement and to advance the information to the door for additional investigation. WNs are utilized in numerous applications, for example, in medical care for in correspondence; in utilities, for example, in enterprises to screen the condition of gear and distinguish any breakdown during ordinary creation movement. By and large, WNs take estimations of the ideal application and send this data to a door, by which the client can decipher the data to accomplish the ideal reason. The fundamental significance of WNs in area of interruption discovery is that they can be prepared to recognize the interruption and ongoing assaults in the CIC IDS 2019 Dataset. The proposed framework has been prepared on 70% for training while 20% is utilized for testing and validation 10% for approval. To show the meaning of the planned component vector, we utilized a dataset comprising of different classes which addressed a subset of all current sorts of fusion networks. The work has acted in python pro-gramming language with a few tool kits of profound learning were being utilized for this reason. WNs directing conventions are intended to lay out courses between the source and objective hubs. What these directing shows do is that they rot the association into extra reasonable pieces and give ways to deal with splitting information between its neighbors first and subsequently all through the whole association. The location of fascinating libraries and strategies is ceaselessly creating, just like the possible results and decisions for tests. Executing the framework in python helps in decreasing syntactic unpredictability, increases execution diverged from executions in setting up tongues, and gives memory prosperity. How memory prosperity is a significant issue for the current interference acknowledgment frameworks has been seen by this advance investiga-tion, which have begun to port bits of their show unwinding reasoning to achieve a precision of 99.21% for recognizing all of the interferences inside the WN that use a parser age design to accomplish safe show parsing.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Network Anomaly Detection Using Random Forests and Entropy of Traffic Features
    Yao, Dong
    Yin, Meijuan
    Luo, Junyong
    Zhang, Silong
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 926 - 929
  • [42] Performance of Interval-based Features for Anomaly Detection in Network Traffic
    Limthong, Kriangkrai
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 361 - 362
  • [43] Network Traffic Anomaly Detection Method Based on Deep Features Learning
    Dong Shuqin
    Zhang Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (03) : 695 - 703
  • [44] Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection
    Saganowski, Lukasz
    Andrysiak, Tomasz
    INTERNATIONAL JOINT CONFERENCE 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS (CISIS 2022) 13TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATION (ICEUTE 2022), 2023, 532 : 30 - 39
  • [45] A mobile malware detection method using behavior features in network traffic
    Wang, Shanshan
    Chen, Zhenxiang
    Yan, Qiben
    Yang, Bo
    Peng, Lizhi
    Jia, Zhongtian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 133 : 15 - 25
  • [46] Network Traffic Anomaly Detection Method Based on Deep Features Learning
    Dong S.
    Zhang B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (03): : 695 - 703
  • [47] Network Intrusion Traffic Detection Based on Feature Extraction
    Yu, Xuecheng
    Huang, Yan
    Zhang, Yu
    Song, Mingyang
    Jia, Zhenhong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 473 - 492
  • [48] Image-Based Intrusion Detection in Network Traffic
    Golubev, Sergei
    Novikova, Evgenia
    INTELLIGENT DISTRIBUTED COMPUTING XV, IDC 2022, 2023, 1089 : 51 - 60
  • [49] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy, Vasaki
    Yichiet, Aun
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Almufareh, Maram Fahhad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 865 - 879
  • [50] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy V.
    Yichiet A.
    Jhanjhi N.Z.
    Humayun M.
    Almufareh M.F.
    Computer Systems Science and Engineering, 2021, 40 (03): : 865 - 879