Nearest Neighbor Intrusion Detection Method Based on Perceived Hash Matrix

被引:0
|
作者
Jiang Z.-T. [1 ]
Zhou T.-S.-Z. [1 ]
Han L.-Y. [2 ]
机构
[1] College of Computer and Information Security, Guilin University of Electronic Technology, Guilin, 541004, Guangxi
[2] College of Computer Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, Shaanxi
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2019年 / 47卷 / 07期
关键词
Detection rate; Intrusion detection; KNN; Perceptual Hash matrix; Quantization function;
D O I
10.3969/j.issn.0372-2112.2019.07.019
中图分类号
学科分类号
摘要
In view of the low efficiency of current intrusion detection, this paper proposes a Nearest Neighbor Intrusion Detection algorithm based on Perceptual Hash Matrix.Firstly, the perceptual Hash descriptors of the intrusion detection object in the training set is calculated, and the perceptual Hash descriptors are spliced into a perceptual Hash matrix; Then use the designed quantization function to quantize the Hash digest in the matrix, and reduce and adjust the matrix according to the nature of the perceived Hash.In the intrusion detection phase, the matrix is used to quickly locate K samples closest to the object to be detected, using K nearest neighbors(KNN)'s voting principles to complete intrusion detection tasks.Theoretical analysis and related experiments on the KDDCUP99 dataset show that the method can quickly locate the nearest neighbor K samples with the O(n) of time complexity, which can reduce the overhead of storage and calculation while maintaining high detection rate, and more effectively protect the network environment. © 2019, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1538 / 1546
页数:8
相关论文
共 11 条
  • [1] Deshpande P., Sharma S.C., Et al., HIDS: A host based intrusion detection system for cloud computing environment, International Journal of System Assurance Engineering and Management, 9, 3, pp. 567-576, (2018)
  • [2] Gao N., Gao L., He Y.Y., Wang H., A lightweight intrusion detection model based on autoencoder network with feature reduction, Acta Electronica Sinica, 45, 3, pp. 730-739, (2017)
  • [3] Chawla A., Lee B., Fallon S., Et al., Host based intrusion detection system with combined cnn/rnn model, Proceedings of Second International Workshop on AI in Security, pp. 149-158, (2018)
  • [4] Wagh S., Neelwarna G., Kolhe S., Multi-disciplinary Trends in Artificial Intelligence, pp. 143-154, (2012)
  • [5] Jain P., Kulis B., Dhillon I.S., Grauman K., Online metric learning and fast similarity search, Proceedings of the 21st International Conference on Neural Information Processing Systems NIPS'08, pp. 761-768, (2008)
  • [6] Friedman J.H., Bentley J.L., Finkel R.A., An algorithm for finding best matches in logarithmic expected time, ACM Trans Math Softw, 3, 3, pp. 209-226, (1977)
  • [7] Liu T., Moore A.W., Gray A., Efficient exact K-NN and nonparametric classification in high dimensions, Proceedings of the 16th International Conference on Neural Information Processing Systems, pp. 265-272, (2003)
  • [8] Stolfo S.J., Fan W., Lee W.K., Et al., Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
  • [9] Johnstone I.M., Lu A.Y., Sparse principal components analysis
  • [10] Niu X.M., Jiao Y.H., An overview of perception Hashing, Acta Electronica Sinica, 36, 7, pp. 1405-1411, (2008)