A Novel Network Intrusion Detection Method for Unbalanced Data in Open Scenarios

被引:0
|
作者
Gong, Zihui [1 ,2 ]
Wang, Qiang [3 ]
He, Wenfeng [4 ]
Cao, Chuqing [2 ]
Zheng, Liang [2 ]
Yu, Yanwu [5 ]
机构
[1] Zhejiang Gongshang Univ, Sussex Artificial Intelligence Inst, Hangzhou 310018, Peoples R China
[2] Yangtze River Delta HIT Robot Technol Res Inst, Anhui Prov Key Lab Machine Vis Inspect, Wuhu 241000, Peoples R China
[3] Acad Mil Sci, Beijing 100080, Peoples R China
[4] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518060, Peoples R China
[5] Shenzhen Light Second Co Ltd, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金;
关键词
Network intrusion detection; Zero-shot learning; Class imbalance; Deep learning;
D O I
10.1007/978-981-97-5489-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of information technology, network intrusion attacks continue to evolve, making the detection and defense increasingly urgent. In order to cope with the emerging threats, which are mostly unknown and can hardly be handled by traditional intrusion detection methods, we propose a data and knowledge driven solution in this work. Firstly, the knowledge revealing commonalities and features of different attacks is extracted from the public attack behaviors and encoded by using doc2vec. Then relying on zero-shot learning, the detection model is transferred to the accurate identification of unknown attack types. Considering that the vast majority of training samples are non-attack behaviors rather than attack behaviors, this imbalance in sample quantities often leads the detection model to be biased toward the larger class samples. We employ the SMOTE (Synthetic Minority Over-sampling Technique) method to synthesize small class samples, achieving a relatively balanced distribution of training samples across different categories. Experimental evaluation on the refined NSL-KDD dataset demonstrates the effectiveness of the proposed method in detecting network intrusion in open environments with unknown attacks.
引用
收藏
页码:283 / 293
页数:11
相关论文
共 50 条
  • [1] Application of Unbalanced Data Approach to Network Intrusion Detection
    Zhao, Yueai
    Chen, Junjie
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 140 - +
  • [2] Industrial network intrusion detection in open-set scenarios
    Yu, Wei
    Chen, Zhixiang
    Wang, Hui
    Miao, Zeyu
    Zhong, Dake
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [3] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [4] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [5] A novel intrusion detection method
    Jiang, SY
    Li, QH
    Wang, H
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2004, 3222 : 459 - 462
  • [6] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [7] A novel network intrusion detection method based on metaheuristic optimisation algorithms
    Ghanbarzadeh R.
    Hosseinalipour A.
    Ghaffari A.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (06) : 7575 - 7592
  • [8] Data mining based network intrusion detection method in the environment of IoT
    Wu, Guihua
    Xie, Lijing
    INTERNET TECHNOLOGY LETTERS, 2025, 8 (01)
  • [9] Visualizing network data for intrusion detection
    Abdullah, K
    Lee, A
    Conti, G
    Copeland, JA
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
  • [10] Data analytics for network intrusion detection
    Wang, Lidong
    Jones, Randy
    Journal of Cyber Security Technology, 2020, 4 (02) : 106 - 123