A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine

被引:2
作者
Hao Zhang [1 ,2 ]
Yongdan Li [3 ]
Zhihan Lv [1 ,4 ]
Arun Kumar Sangaiah [1 ,5 ]
Tao Huang [2 ]
机构
[1] IEEE
[2] the National Engineering Laboratory for Educational Big Data, Central China Normal University
[3] Lanzhou Central Sub-branch of The People’s Bank of China
[4] the School of Data Science and Software Engineering, Qingdao University
[5] the School of Computing Science and Engineering, Vellore Institute of Technology University
关键词
Deep belief network(DBN); flow calculation; frequent pattern; intrusion detection; sliding window; support vector machine(SVM);
D O I
暂无
中图分类号
TP393.08 []; TP181 [自动推理、机器学习];
学科分类号
0839 ; 1402 ; 081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, network traffic data have become larger and more complex, leading to higher possibilities of network intrusion. Traditional intrusion detection methods face difficulty in processing high-speed network data and cannot detect currently unknown attacks. Therefore, this paper proposes a network attack detection method combining a flow calculation and deep learning. The method consists of two parts: a real-time detection algorithm based on flow calculations and frequent patterns and a classification algorithm based on the deep belief network and support vector machine(DBN-SVM). Sliding window(SW) stream data processing enables real-time detection, and the DBN-SVM algorithm can improve classification accuracy. Finally, to verify the proposed method, a system is implemented.Based on the CICIDS2017 open source data set, a series of comparative experiments are conducted. The method's real-time detection efficiency is higher than that of traditional machine learning algorithms. The attack classification accuracy is 0.7 percentage points higher than that of a DBN, which is 2 percentage points higher than that of the integrated algorithm boosting and bagging methods. Hence, it is suitable for the real-time detection of high-speed network intrusions.
引用
收藏
页码:790 / 799
页数:10
相关论文
共 15 条
[1]  
An Online Fault Detection Model and Strategies Based on SVM-Grid in Clouds[J]. Pei Yun Zhang,Sheng Shu,Meng Chu Zhou. IEEE/CAA Journal of Automatica Sinica. 2018(02)
[2]   面向入侵检测系统的Deep Belief Nets模型 [J].
高妮 ;
高岭 ;
贺毅岳 .
系统工程与电子技术, 2016, 38 (09) :2201-2207
[3]   滑动窗口数据流聚类算法在IDS中的应用 [J].
朱琳 ;
朱参世 .
计算机工程与应用 , 2014, (01) :87-90
[4]   基于主动学习和TCM-KNN方法的有指导入侵检测技术 [J].
李洋 ;
方滨兴 ;
郭莉 ;
田志宏 .
计算机学报, 2007, (08) :1464-1473
[5]   基于数据流的异常入侵检测 [J].
俞研 ;
郭山清 ;
黄皓 .
计算机科学, 2007, (05) :66-71+114
[6]  
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks[J] . Wei Wang,Thomas Guyet,René Quiniou,Marie-Odile Cordier,Florent Masseglia,Xiangliang Zhang. Knowledge-Based Systems . 2014
[7]  
A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks[J] . Amin Karami,Manel Guerrero-Zapata. Neurocomputing . 2014
[8]  
Effective approach toward Intrusion Detection System using data mining techniques[J] . G.V. Nadiammai,M. Hemalatha. Egyptian Informatics Journal . 2013
[9]   An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique [J].
Shamshirband, Shahaboddin ;
Anuar, Nor Badrul ;
Kiah, Miss Laiha Mat ;
Patel, Ahmed .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2013, 26 (09) :2105-2127
[10]  
Effects-based feature identification for network intrusion detection[J] . Panos Louvieris,Natalie Clewley,Xiaohui Liu. Neurocomputing . 2013