Intelligent Processing of Intrusion Detection Data

被引:7
|
作者
Duan, Tao [1 ,3 ,4 ,5 ,6 ]
Tian, Youhui [2 ]
Zhang, Hanrui [1 ,3 ,5 ,6 ]
Liu, Yaozong [3 ]
Li, Qianmu [1 ]
Jiang, Jian [4 ]
Shi, Zongsheng [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[2] Jiangsu Vocat Inst Commerce, Nanjing 211168, Peoples R China
[3] Wuyi Univ, Intelligent Mfg, Jiangmen 529020, Peoples R China
[4] Jiangsu Zhongtian Internet Technol Co Ltd, Nantong 226463, Peoples R China
[5] Nanjing Univ Sci & Technol, Jiangsu Grad Workstn, Nanjing 210094, Peoples R China
[6] Nanjing Liancheng Technol Dev Co Ltd, Nanjing 210008, Peoples R China
关键词
Intrusion detection; Feature extraction; Principal component analysis; Biological neural networks; Data processing; Data models; Analytical models; data mining; deep belief network;
D O I
10.1109/ACCESS.2020.2989498
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection technology, as an active and effective dynamic network defense technology, has rapidly become a hot research topic in the field of network security since it was proposed. However, current intrusion detection still faces some problems and challenges that affect its detection performance. Especially with the rapid development of the current network, the volume and dimension of network data are increasing day by day, and the network is full of a large number of unlabeled data, which brings great pressure on the data processing methods of IDS. In view of the tremendous pressure of intrusion detection brought by the current complex and high-dimensional network environment, this paper provides a feasible solution. Firstly, this paper briefly outlines the necessity of feature learning, the shortcomings of traditional feature learning methods and the new breakthroughs brought by deep belief network in feature learning, and focuses on the principle and working mechanism of deep belief network and Principal Component Analysis (PCA). Then, it constructs the intrusion detection model based on PCA-BP and DBN respectively. And through the experimental evaluation of the two detection models, a comparative experiment between deep belief network and principal component analysis is constructed. The experimental results show that deep belief network has unique advantages and good performance in feature learning. Therefore, deep belief network can be applied in the field of intrusion detection to extract effective features from the current high-dimensional and redundant network data, thereby improving the detection performance of IDS and its adaptability to the current complex and high-dimensional network environment.
引用
收藏
页码:78330 / 78342
页数:13
相关论文
共 50 条
  • [1] Research on Intelligent Detection of Intrusion Data in Network
    Zhu, Guangjie
    Yao, Honglei
    [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5 - 10
  • [2] Application of intelligent information processing technologies to intrusion detection system
    Wang, Xuren
    He, Famei
    Peng, Yan
    [J]. General System and Control System, Vol I, 2007, : 274 - 277
  • [3] Application of PSVM and data processing for intrusion detection
    Xiao, Haijun
    Hong, Fan
    Zhang, Zhaoli
    Liao, Junguo
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 627 - 633
  • [4] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    [J]. JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
  • [5] Intelligent intrusion detection based on fuzzy Big Data classification
    Farah Jemili
    [J]. Cluster Computing, 2023, 26 : 3719 - 3736
  • [6] Intelligent intrusion detection based on fuzzy Big Data classification
    Jemili, Farah
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3719 - 3736
  • [7] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [8] Immune algorithms based on data processing in intrusion detection
    Zhang, Yufang
    Xiong, Zhongyang
    Chen, Yan
    Li, Guangyong
    Geng, Xiaofei
    [J]. Journal of Computational Information Systems, 2008, 4 (01): : 293 - 300
  • [9] Less is More:Data Processing with SVM for Intrusion Detection
    肖海军
    洪帆
    王玲
    [J]. Railway Engineering Science, 2009, 17 (01) : 9 - 15
  • [10] Approaches and Data Processing Techniques for Intrusion Detection Systems
    Srinivasu, Pakkurthi
    Avadhani, P. S.
    Korimilli, Vishal
    Ravipati, Prudhvi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 181 - 186