Data analytics for network intrusion detection

被引:1
|
作者
Wang, Lidong [1 ]
Jones, Randy [1 ]
机构
[1] Institute for Systems Engineering Research, Mississippi State University, Vicksburg,MS, United States
关键词
Bayesian classification - Cyber security - Forward algorithms - Network intrusion detection - Network intrusions - Probability evaluation - R languages - Spam emails;
D O I
10.1080/23742917.2019.1703525
中图分类号
学科分类号
摘要
A network intrusion can be any unauthorized activity on a network and network intrusion detection is a significant topic in cybersecurity. Data analytics is conducted on the database ‘spambase’ as an example of analysis for network intrusion detection based on the Naïve Bayesian classification, deep learning with the algorithm of Rprop+ and the hidden Markov model (HMM), respectively. All the analysis is fulfilled using R language and its functions. An HMM based on the Baum–Welch algorithm has been created on the database ‘spambase’ through training and parameter estimation. An HMM-based spam-email prediction has been performed through the probability evaluation based on the forward algorithm. The analytics results obtained from the above three methods are compared. It is shown that HMM-based analytics can achieve the best accuracy in the spam-email classification although only a few features are used in the HMM while all features are used in the Naïve Bayesian classification and deep learning. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:106 / 123
相关论文
共 50 条
  • [41] Applied Research on Data Mining Algorithm in Network Intrusion Detection
    Xue, Ming
    Zhu, Changjun
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 275 - +
  • [42] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
  • [43] Technology and System of Network Intrusion Detection Based on Big Data
    Bi, Jia'na
    Chen, Xiangjun
    2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 251 - 255
  • [44] An analysis of distributed sensor data aggregation for network intrusion detection
    McEachen, John C.
    Kah, Cheng Wai
    MICROPROCESSORS AND MICROSYSTEMS, 2007, 31 (04) : 263 - 272
  • [45] Data Analytics on Network Traffic Flows for Botnet Behaviour Detection
    Le, Duc C.
    Zincir-Heywood, A. Nur
    Heywood, Malcolm I.
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [46] Data Balancing and CNN based Network Intrusion Detection System
    Elghalhoud, Omar
    Naik, Kshirasagar
    Zaman, Marzia
    Manzano, Ricardo S.
    2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [47] Data Mining Based Network Intrusion Detection System: A Survey
    Helali, Rasha G. Mohammed
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 501 - 505
  • [48] Data Mining for Network Intrusion Detection System in Real Time
    Peng, Tao
    Zuo, Wanli
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 173 - 177
  • [49] A Model of Intrusion Detection Based on Data Mining in Campus Network
    Qi Bei
    Dong Yun-feng
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 317 - +
  • [50] Research on a Network Intrusion Detection System Based on Data Mining
    Fang, Zhongjin
    Zhou, Shu
    2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 204 - 209