Network intrusion detection method based on matrix factorization of their time and frequency representations

被引:1
|
作者
Chountasis, Spiros [1 ]
Pappas, Dimitrios [2 ]
Sklavounos, Dimitris [3 ]
机构
[1] Independent Power Transmiss Operator, Dept Syst & Infrastruct, Athens, Greece
[2] Athens Univ Econ & Business, Dept Stat, Athens, Greece
[3] Metropolitan Coll, Dept Comp Sci, Athens, Greece
关键词
network analysis; network security; principal component analysis; singular value decomposition; SYSTEMS;
D O I
10.4218/etrij.2019-0476
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.
引用
收藏
页码:152 / 162
页数:11
相关论文
共 50 条
  • [31] Network intrusion detection method based on GRU-RNN
    Li, Jun
    Xia, Songzhu
    Lan, Haiyan
    Li, Shouzheng
    Sun, Jianguo
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (06): : 879 - 884
  • [32] Network Intrusion Detection Method Based on PCA and Bayes Algorithm
    Zhang, Bing
    Liu, Zhiyang
    Jia, Yanguo
    Ren, Jiadong
    Zhao, Xiaolin
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [33] Detection method of network intrusion based on learning Petri nets
    Wei, Sheng-Jun
    Hu, Chang-Zhen
    Gao, Xiu-Feng
    Binggong Xuebao/Acta Armamentarii, 2006, 27 (02): : 269 - 272
  • [34] Misuse detection method of network intrusion based on HMM models
    Peng Zhu-Miao
    Zhang Zheng-Dao
    Bai Rul-Lin
    Zang Xian-Feng
    PROCEEDINGS OF THE 2007 CHINESE CONTROL AND DECISION CONFERENCE, 2007, : 694 - +
  • [35] NETWORK INTRUSION DETECTION METHOD BASED ON RS-MSVM
    Xiao Yun Han Chongzhao Zheng Qinghua Zhang Junjie (School of Electronic & Info. Eng.
    Journal of Electronics(China), 2006, (06) : 901 - 905
  • [36] Intrusion Detection Method Based on Capsule Network for Industrial Internet
    Hu X.-D.
    Li Z.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (06): : 1457 - 1465
  • [37] An unsupervised host-based anomaly intrusion detection technique based on non-negative matrix factorization
    Sun, Wei
    Ke, Yongzhen
    Liu, Wenju
    Wang, Ze
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 238 - +
  • [38] A Novel Method for Network Intrusion Detection
    Wang, Hongmin
    Wei, Qiang
    Xie, Yaobin
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [39] Nearest Neighbor Intrusion Detection Method Based on Perceived Hash Matrix
    Jiang Z.-T.
    Zhou T.-S.-Z.
    Han L.-Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (07): : 1538 - 1546
  • [40] Network Intrusion Detection Method Based on Radial Basic Function Neural Network
    Tian, Jingwen
    Gao, Meijuan
    Zhang, Fan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 369 - +