期刊文献+

A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine 被引量:7

下载PDF
导出
摘要 In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine(DBN-SVM). Sliding window(SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented.Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method's real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions.
出处 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第3期790-799,共10页 自动化学报(英文版)
基金 supported by the National Key Research and Development Program of China(2017YFB1401300,2017YFB1401304) the National Natural Science Foundation of China(61702211,L1724007,61902203) Hubei Provincial Science and Technology Program of China(2017AKA191) the Self-Determined Research Funds of Central China Normal University(CCNU)from the Colleges’Basic Research(CCNU17QD0004,CCNU17GF0002) the Natural Science Foundation of Shandong Province(ZR2017QF015) the Key Research and Development Plan–Major Scientific and Technological Innovation Projects of Shandong Province(2019JZZY020101)。
  • 相关文献

参考文献5

二级参考文献46

  • 1Endorf C,Schultz E,Mellander J.Intrusion Detection & Prevention.McGraw-Hill,2004
  • 2Lee Wenke,Stolfo S J,Mok K W.A data mining framework for building intrusion detection models.In:Proceedings of the 1999 IEEE Symposium on Security and Privacy,Oakland,1999
  • 3Cannady J,Mahaffey J.The Application of Artificial Neural Networks to Misuse Detection:Initial Results.In:Proceedings of the 1st International Workshop on Recent Advances in Intrusion Detection (RAID 1998),1998
  • 4Mukkamala S,Sung A H.Feature Ranking and Selection for Intrusion detection Systems.In:Proceedings of International Conference on Information and Knowledge Engineering,2002.503~509
  • 5Han Jiawei,Kamber M.Data Mining:Concepts and Techniques.Morgan Kaufmann Publishers,2001
  • 6Breunig M M,Kriegel H P,Ng R T,et al.LOF:Identifying density-based local outliers.In:Proceedings of the ACM SIGMOD International Conference on Management of Data Dallas,2000.93~104
  • 7Portnoy L,Eskin E,Stolfo S J.Intrusion detection with unlabeled data using clustering.In:Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001),Philadelphia,2001
  • 8Wang Q,Megalooikonomou v.A clustering algorithm for intrusion detection.In:SPIE Conference on Data Mining,Intrusion Detection,Information Assurance,and Data Networks Security 2005.Orlando,Florida,USA,Mar.2005
  • 9Denning D E.An Intrusion Detection Model.IEEE Transaction on Software Engineering,1987,SE-13:222~232
  • 10Babcock B,Babu S,Datar M,et al.Models and issues in data streams.In:Proceedings of the 21st ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems.Madison:ACM Press.2002.1~16

共引文献84

同被引文献55

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部