Network intrusion detection method based on matrix factorization of their time and frequency representations

被引:1
|
作者
Chountasis, Spiros [1 ]
Pappas, Dimitrios [2 ]
Sklavounos, Dimitris [3 ]
机构
[1] Independent Power Transmiss Operator, Dept Syst & Infrastruct, Athens, Greece
[2] Athens Univ Econ & Business, Dept Stat, Athens, Greece
[3] Metropolitan Coll, Dept Comp Sci, Athens, Greece
关键词
network analysis; network security; principal component analysis; singular value decomposition; SYSTEMS;
D O I
10.4218/etrij.2019-0476
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.
引用
收藏
页码:152 / 162
页数:11
相关论文
共 50 条
  • [21] Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
    Snasel, Vaclav
    Platos, Jan
    Kromer, Pavel
    Abraham, Ajith
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 172 - +
  • [22] Intrusion detection using wavelet transform and non negative matrix factorization
    Ke, Yongzhen
    Sun, Wei
    Liu, Wenju
    Wang, Ze
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1345 - +
  • [23] Network Intrusion Detection Based on Stochastic Neural Networks Method
    Yang, Yunfeng
    Tang, Fengxian
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 435 - 446
  • [24] Network Intrusion Detection Method Based on Relevance Deep Learning
    Jing, Li
    Bin, Wang
    2016 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2017, : 237 - 240
  • [25] Intrusion detection method based on a deep convolutional neural network
    Zhang S.
    Xie X.
    Xu Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2019, 59 (01): : 44 - 52
  • [26] NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM
    Xiao Yun Han Chongzhao Zheng Qinghua Zhang Junjie School of Electronic Info Eng Xian Jiaotong University Xian China
    JournalofElectronics, 2006, (06) : 901 - 905
  • [27] Method of evolutionary neural network-based intrusion detection
    Wang, L
    Yu, G
    Wang, GR
    Wang, D
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E13 - E18
  • [28] A Network Intrusion Detection Method Based on Stacked Autoencoder and LSTM
    Yan, Yu
    Qi, Lin
    Wang, Jie
    Lin, Yun
    Chen, Lei
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [29] Intrusion Detection Method Based on Complementary Adversarial Generation Network
    Li, Lixiang
    Liu, Yuxuan
    Peng, Haipeng
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2023, PT II, 2023, 13969 : 260 - 271
  • [30] Method of evolutionary neural network-based intrusion detection
    Wang, Li-Na
    Dong, Xiao-Mei
    Yu, Ge
    Wang, Dong
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2002, 23 (02): : 107 - 110