Intrusion Detection Classification Model on an Improved k-Dependence Bayesian Network

被引:12
|
作者
Yin, Hongsheng [1 ]
Xue, Mengyang [1 ]
Xiao, Yuteng [1 ]
Xia, Kaijian [1 ,2 ]
Yu, Guofang [1 ]
机构
[1] China Univ Min & Technol, Sch Informat & Control Engn, Xuzhou 221116, Jiangsu, Peoples R China
[2] Soochow Univ, Changshu Hosp, Changshu 215500, Jiangsu, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
IDCM; KDBN; network security; virtual augmentation method;
D O I
10.1109/ACCESS.2019.2949890
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing extends traditional cloud services to the edge of the network, and the highly dynamic and heterogeneous environment at the edge of the network makes the network security situation facing severe challenges. Therefore, it is of great theoretical and practical significance to study and build a high-precision Intrusion Detection Classification Model (IDCM) for network security in the emerging edge computing mode. This paper studies an improved k-dependency Bayesian network (KDBN) structural model that can accurately describe the dependence relationships among system variables and reduce the complexity of the Bayesian network structure by reducing the directed edges of weak dependence. On this basis, this paper constructs an IDCM based on improved KDBN by introducing the maximum a posterior criterion and a virtual augmentation method for samples of small category. The experiments use the KDDCup99 (10%) intrusion detection data set for verification, which show that the IDCM based on improved KDBN has high efficiency, high detection accuracy and high stability, which optimally addresses the issues discussed in many references, such as low detection accuracy and poor stability, for small categories (U2R and R2L) in the KDDCup99 (10%) intrusion detection data set.
引用
收藏
页码:157555 / 157563
页数:9
相关论文
共 50 条
  • [41] An optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network
    Wei, Peng
    Li, Yufeng
    Zhang, Zhen
    Hu, Tao
    Li, Ziyong
    Liu, Diyang
    IEEE ACCESS, 2019, 7 : 87593 - 87605
  • [42] Network Intrusion Logit Detection Model with IO Port Cross-Classification
    Sun, Jingchun
    Deng, Fei
    Su, Qin
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2022, 36 (05)
  • [43] Feature Engineering and Model Optimization Based Classification Method for Network Intrusion Detection
    Zhang, Yujie
    Wang, Zebin
    APPLIED SCIENCES-BASEL, 2023, 13 (16):
  • [44] False alarm classification model for network-based intrusion detection system
    Shin, MS
    Kim, EH
    Ryu, KH
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING IDEAL 2004, PROCEEDINGS, 2004, 3177 : 259 - 265
  • [45] A classification model based on svm and fuzzy rough set for network intrusion detection
    Shen Kejia
    Parvin, Hamid
    Qasem, Sultan Noman
    Bui Anh Tuan
    Pho, Kim-Hung
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (05) : 6801 - 6817
  • [46] Comparison of classification techniques applied for network intrusion detection and classification
    Aziz, Amira Sayed A.
    EL-Ola Hanafi, Sanaa
    Hassanien, Aboul Ella
    JOURNAL OF APPLIED LOGIC, 2017, 24 : 109 - 118
  • [47] Comparative study between Bayesian network and possibilistic network in intrusion detection
    Arfaoui, Najla
    Jemili, Farah
    Zaghdoud, Montaceur
    Ben Ahmed, Mohamed
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 24 - +
  • [48] Method for Constructing Network Intrusion Detection Model Based on Improved Apriori Algorithm
    Wu, Linlin
    Engineering Intelligent Systems, 2024, 32 (02): : 159 - 168
  • [49] Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
    Ali, Mohammed Hasan
    Zolkipli, Mohamed Fadli
    INTELLIGENT COMPUTING & OPTIMIZATION, 2019, 866 : 146 - 157
  • [50] Network Security Intrusion Detection System based on Incremental Improved Convolutional Neural Network Model
    Deng, Chao
    Qiao, Haiye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 883 - 887