Data analytics for network intrusion detection

被引:1
|
作者
Wang, Lidong [1 ]
Jones, Randy [1 ]
机构
[1] Institute for Systems Engineering Research, Mississippi State University, Vicksburg,MS, United States
关键词
Bayesian classification - Cyber security - Forward algorithms - Network intrusion detection - Network intrusions - Probability evaluation - R languages - Spam emails;
D O I
10.1080/23742917.2019.1703525
中图分类号
学科分类号
摘要
A network intrusion can be any unauthorized activity on a network and network intrusion detection is a significant topic in cybersecurity. Data analytics is conducted on the database ‘spambase’ as an example of analysis for network intrusion detection based on the Naïve Bayesian classification, deep learning with the algorithm of Rprop+ and the hidden Markov model (HMM), respectively. All the analysis is fulfilled using R language and its functions. An HMM based on the Baum–Welch algorithm has been created on the database ‘spambase’ through training and parameter estimation. An HMM-based spam-email prediction has been performed through the probability evaluation based on the forward algorithm. The analytics results obtained from the above three methods are compared. It is shown that HMM-based analytics can achieve the best accuracy in the spam-email classification although only a few features are used in the HMM while all features are used in the Naïve Bayesian classification and deep learning. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:106 / 123
相关论文
共 50 条
  • [21] Application of Unbalanced Data Approach to Network Intrusion Detection
    Zhao, Yueai
    Chen, Junjie
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 140 - +
  • [22] Dimensionality Reduction and Visualization of Network Intrusion Detection Data
    Zong, Wei
    Chow, Yang-Wai
    Susilo, Willy
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 441 - 455
  • [23] SCADA-Wireshark Testbed data-based Exploratory Data Analytics and Intrusion Detection
    Biswas, Hillol
    Kumar, Muthyala Manoj
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [24] Research on the Application of the Data Mining in Network Intrusion Detection
    Shen, Wei
    2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
  • [25] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [26] Enhancing network based intrusion detection for imbalanced data
    Engen, Vegard
    Vincent, Jonathan
    Phalp, Keith
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2008, 12 (5-6) : 357 - 367
  • [27] Data stream mining architecture for network intrusion detection
    Chu, NCN
    Williams, A
    Alhajj, R
    Barker, K
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 363 - 368
  • [28] A Network Intrusion Detection System for Concept Drifting Network Traffic Data
    Andresini, Giuseppina
    Appice, Annalisa
    Loglisci, Corrado
    Belvedere, Vincenzo
    Redavid, Domenico
    Malerba, Donato
    DISCOVERY SCIENCE (DS 2021), 2021, 12986 : 111 - 121
  • [29] Big Data Analytics for Network Anomaly Detection from Netflow Data
    Terzi, Duygu Sinanc
    Terzi, Ramazan
    Sagiroglu, Seref
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 592 - 597
  • [30] Visual analytics for intrusion detection in spam emails
    Zhang, Jinson
    Huang, Mao Lin
    Hoang, Doan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 178 - 186