Intelligent Processing of Intrusion Detection Data

被引:7
|
作者
Duan, Tao [1 ,3 ,4 ,5 ,6 ]
Tian, Youhui [2 ]
Zhang, Hanrui [1 ,3 ,5 ,6 ]
Liu, Yaozong [3 ]
Li, Qianmu [1 ]
Jiang, Jian [4 ]
Shi, Zongsheng [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[2] Jiangsu Vocat Inst Commerce, Nanjing 211168, Peoples R China
[3] Wuyi Univ, Intelligent Mfg, Jiangmen 529020, Peoples R China
[4] Jiangsu Zhongtian Internet Technol Co Ltd, Nantong 226463, Peoples R China
[5] Nanjing Univ Sci & Technol, Jiangsu Grad Workstn, Nanjing 210094, Peoples R China
[6] Nanjing Liancheng Technol Dev Co Ltd, Nanjing 210008, Peoples R China
关键词
Intrusion detection; Feature extraction; Principal component analysis; Biological neural networks; Data processing; Data models; Analytical models; data mining; deep belief network;
D O I
10.1109/ACCESS.2020.2989498
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection technology, as an active and effective dynamic network defense technology, has rapidly become a hot research topic in the field of network security since it was proposed. However, current intrusion detection still faces some problems and challenges that affect its detection performance. Especially with the rapid development of the current network, the volume and dimension of network data are increasing day by day, and the network is full of a large number of unlabeled data, which brings great pressure on the data processing methods of IDS. In view of the tremendous pressure of intrusion detection brought by the current complex and high-dimensional network environment, this paper provides a feasible solution. Firstly, this paper briefly outlines the necessity of feature learning, the shortcomings of traditional feature learning methods and the new breakthroughs brought by deep belief network in feature learning, and focuses on the principle and working mechanism of deep belief network and Principal Component Analysis (PCA). Then, it constructs the intrusion detection model based on PCA-BP and DBN respectively. And through the experimental evaluation of the two detection models, a comparative experiment between deep belief network and principal component analysis is constructed. The experimental results show that deep belief network has unique advantages and good performance in feature learning. Therefore, deep belief network can be applied in the field of intrusion detection to extract effective features from the current high-dimensional and redundant network data, thereby improving the detection performance of IDS and its adaptability to the current complex and high-dimensional network environment.
引用
收藏
页码:78330 / 78342
页数:13
相关论文
共 50 条
  • [21] Hybrid Intelligent Intrusion Detection Scheme
    Salama, Mostafa A.
    Eid, Heba F.
    Ramadan, Rabie A.
    Darwish, Ashraf
    Hassanien, Aboul Ella
    [J]. SOFT COMPUTING IN INDUSTRIAL APPLICATIONS, 2011, 96 : 293 - +
  • [22] Research on intelligent Intrusion Detection Systems
    Nakamura, Y
    Fujita, H
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 500 - 505
  • [23] Intelligent progression for anomaly intrusion detection
    Marimuthu, A.
    Shanmugam, A.
    [J]. 2008 6TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, 2008, : 242 - +
  • [24] RETRACTED: Class Image Processing Application of XSS Intrusion Intelligent Detection for Big Data in Campus Network Construction (Retracted Article)
    Zhang, Zhe
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [25] A Survey on Data-Driven Learning for Intelligent Network Intrusion Detection Systems
    Abdelmoumin, Ghada
    Whitaker, Jessica
    Rawat, Danda B.
    Rahman, Abdul
    [J]. ELECTRONICS, 2022, 11 (02)
  • [26] Hybrid intelligent intrusion Detection/Prevention System using fuzzylogic and data mining
    Shanmugam, Bharanidharan
    Idris, Norbik Bashah
    [J]. ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 237 - 244
  • [27] A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment
    Mohammad, Muamer N.
    Sulaiman, Norrozila
    Muhsin, Osama Abdulkarim
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [28] Research on the data pre-processing in the network abnormal intrusion detection
    [J]. Yin, Guisheng, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (06):
  • [29] Research on the data pre-processing in the network abnormal intrusion detection
    Cui, Xiang
    Yin, Guisheng
    Teng, Xuyang
    [J]. Open Automation and Control Systems Journal, 2014, 6 (01): : 1228 - 1232
  • [30] Intelligent query in intrusion detection audit system
    Gao, F
    Xue, Q
    Sun, JZ
    [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2212 - 2216