Network intrusion detection method based on matrix factorization of their time and frequency representations

被引:1
|
作者
Chountasis, Spiros [1 ]
Pappas, Dimitrios [2 ]
Sklavounos, Dimitris [3 ]
机构
[1] Independent Power Transmiss Operator, Dept Syst & Infrastruct, Athens, Greece
[2] Athens Univ Econ & Business, Dept Stat, Athens, Greece
[3] Metropolitan Coll, Dept Comp Sci, Athens, Greece
关键词
network analysis; network security; principal component analysis; singular value decomposition; SYSTEMS;
D O I
10.4218/etrij.2019-0476
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.
引用
收藏
页码:152 / 162
页数:11
相关论文
共 50 条
  • [41] Effects of time and frequency resolution on nonnegative matrix factorization
    Sophea, Seng
    Phon-Amnuaisuk, Somnuk
    2007 INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY CONVERGENCE, PROCEEDINGS, 2007, : 203 - +
  • [42] Network Intrusion Detection Method Based on Improved Simulated Annealing Neural Network
    Gao, Meijuan
    Tian, Jingwen
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL III, 2009, : 261 - 264
  • [43] A new density-based misuse detection method in network intrusion detection
    Kim, Han-joon
    Kim, Keun-tae
    Ahn, Min-young
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2007, 10 (03): : 279 - 288
  • [44] PGAN:A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System
    Li, Zeyi
    Wang, Yun
    Wang, Pan
    Su, Haorui
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 734 - 741
  • [45] Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization
    Wang, W
    Guan, XH
    Zhang, XL
    2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 99 - 104
  • [46] A Method for Intrusion Detection in Web Services Based on Time Series
    Shirani, Paria
    Azgomi, Mohammad Abdollahi
    Alrabaee, Saed
    2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 836 - 841
  • [47] A novel recommendation method based on social network using matrix factorization technique
    Xu Chonghuan
    INFORMATION PROCESSING & MANAGEMENT, 2018, 54 (03) : 463 - 474
  • [48] Efficient Clustering Network Based on Matrix Factorization
    Cheng, Jieren
    Li, Jimei
    Zeng, Faqiang
    Tao, Zhicong
    Yang, Yue
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 281 - 298
  • [49] Network based Intrusion Detection using Time aware LSTM Autoencoder
    Ratti, Ritesh
    Singh, Sanasam Ranbir
    Nandi, Sukumar
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 2570 - 2578
  • [50] Robust Recommendation Method Based on Shilling Attack Detection and Matrix Factorization Model
    Hu, Yu-qi
    Liu, Kai
    Zhang, Fu-zhi
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 300 - 307