期刊文献+

基于机器学习的僵尸物联网检测方法性能评价研究 被引量:2

Performance Evaluation of ZombieIoT Detection Method Based on Machine Learning
下载PDF
导出
摘要 机器学习方法已被逐渐应用于僵尸物联网的检测过程。然而,由于已有研究工作所用的机器学习方法以及实验用的数据集不同,很难对不同机器学习方法在僵尸物联网检测的性能进行一致性地评价。为解决上述问题,从是否使用特征降维、使用特征降维时所用的特征维度数量、测试和训练样本分布比例等三个方面设计了不同的实验方案,并在公共数据集上综合评价了多种基于机器学习的僵尸物联网检测方法。实验结果表明,在同样的数据集下,基于LDA-RandomFores的僵尸网络检测算法最好,基于GaussianNB的检测算法性能最差。实验结果为僵尸物联网检测方法研究与应用,选择合适的检测算法,提供了数据支持。 Machine learning methods have been gradually applied to the detection process of zombie IoT.However,due to different machine learning methods and experimental data sets used in existing research work,it is difficult to consistently evaluate the performance of different machine learning methods in the detection of zombie IoT.In order to solve the above problems,different scenarios are designed from three aspects:the feature dimensionality reduction method,the number of feature dimension when using the feature dimensionality reduction method,and the distribution ratio of the test and training samples.This paper comprehensively evaluates multiple scenarios on the public data set.The experimental results show that under the same data set,the performance of botnet detection algorithm based on LDA-Random Forest is the best,while the detection algorithm based on GaussianNB has the worst performance.The experimental results provide data support for the research and application of zombie IoT detection methods,selecting appropriate detection algorithms.
作者 赵亭 程刚 赵玉艳 Zhao Ting;Cheng Gang;Wu Tao;Guo Haodong;Zhao Yuyan
出处 《滁州学院学报》 2020年第2期69-73,共5页 Journal of Chuzhou University
基金 安徽省高校自然科学研究一般项目“面向实时居家活动分析的传感器数据动态分段方法研究”(KJ2018B05) 安徽省高校自然科学研究重点项目“基于机器人和物联网技术的老人负面情绪识别与干预方法研究”(KJ2019A0647) 滁州市科技计划项目“基于物联网的老人状态智能监测系统”(201712) 滁州学院校级项目“基于老年人状态数据的行为预测方法及系统”(2017qd10)。
关键词 僵尸物联网 机器学习 检测算法 zombie IoT machine learning detection algorithms
  • 相关文献

参考文献4

二级参考文献22

  • 1孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 2CHOI H,,LEE H,KIM H.BotGAD:detecting botnets by cap-turing group activities in network traffic. The Fourth Inter-national ICST Conference on Communication System software a-nd middleware . 2009
  • 3XU Shouhuai.Analyzing DNS Activities of Bot Processes. 4th International Conference on Malicious and Unwanted Soft-ware . 2009
  • 4TAKEMORI K.Detection of NS Resource Record Based DNSQuery Request Packet Traffic and SSH Dictionary Attack Ac-tivity. Intelligent Networks and Intelligent Systems . 2009
  • 5ROMAA D A L,KUBOTA S.DNS Based Spam Bots Detectionin a University. Intelligent Networks and Intelligent System-s . 2008
  • 6NAZARIO J,HOLZ T.As the Net Churns:Fast-Flux BotnetObservations. 3rd International Malicious and Unwanted Soft-ware . 2008
  • 7ZHOU Chenfeng,KARUNASEKERA C,PENG S T.A Self-He-alinng,Self-Protecting Collaborative Intrusion Detection Arch-itecture to Trace-Back Fast-Flux Phishing Domains. IEEENOMS Workshops . 2008
  • 8CAGLAYAN A,TOOTHAKER M,DRAPEAU D,et al.Real-time detection of fast flux service networks. Conference ForHomeland Security,Cybersecurity Applications and Technology . 2009
  • 9CAGLAYAN A,TOOTHAKER M,DRAPEAU D,et al.Beha-vioral Patterns of Fast Flux Service Networks. Cyber Secu-rity and Information Intelligence Track.Hawaii International C-onference on System Sciences . 2010
  • 10WU Jiayan,ZHANG Liwei,QU Sheng,et al.A comparativestudy for fast-flux service networks detection. NetworkedComputing and Advanced Information Management.Sixth Inte-rnational Conference . 2010

共引文献235

同被引文献15

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部