Data analytics for network intrusion detection

被引:1
作者
Wang, Lidong [1 ]
Jones, Randy [1 ]
机构
[1] Institute for Systems Engineering Research, Mississippi State University, Vicksburg, MS
关键词
Data analytics; deep learning; hidden Markov model (HMM); Naïve Bayesian classification; network intrusion;
D O I
10.1080/23742917.2019.1703525
中图分类号
学科分类号
摘要
A network intrusion can be any unauthorized activity on a network and network intrusion detection is a significant topic in cybersecurity. Data analytics is conducted on the database ‘spambase’ as an example of analysis for network intrusion detection based on the Naïve Bayesian classification, deep learning with the algorithm of Rprop+ and the hidden Markov model (HMM), respectively. All the analysis is fulfilled using R language and its functions. An HMM based on the Baum–Welch algorithm has been created on the database ‘spambase’ through training and parameter estimation. An HMM-based spam-email prediction has been performed through the probability evaluation based on the forward algorithm. The analytics results obtained from the above three methods are compared. It is shown that HMM-based analytics can achieve the best accuracy in the spam-email classification although only a few features are used in the HMM while all features are used in the Naïve Bayesian classification and deep learning. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:106 / 123
页数:17
相关论文
共 34 条
  • [1] Kizza J.M., Guide to computer network security, (2009)
  • [2] Huang J., Kalbarczyk Z., Nicol D.M., Knowledge discovery from big data for intrusion detection using LDA, In Big data (BigData Congress), 2014 IEEE international congress on, Anchorage, Alaska: IEEE, pp. 760-761, (2014)
  • [3] Raiyn J., A survey of cyber attack detection strategies, Int J Secur Appl, 8, 1, pp. 247-256, (2014)
  • [4] Han J., Pei J., Kamber M., Data mining: concepts and techniques, (2011)
  • [5] Kabir E., Hu J., Wang H., Et al., A novel statistical technique for intrusion detection systems, Future Gener Comput Syst, 79, pp. 303-318, (2018)
  • [6] Sharma S., Gupta R.K., Intrusion detection system: A review, Int J Secur Appl, 9, 5, pp. 69-76, (2015)
  • [7] Shone N., Ngoc T.N., Phai V.D., Et al., A deep learning approach to network intrusion detection, IEEE Trans Emerging Top Comput Intell, 2, 1, pp. 41-50, (2018)
  • [8] Sperotto A., Aiko P., Flow-based intrusion detection, In Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on, pp. 958-963, (2011)
  • [9] Raut A.S., Singh K.R., Anomaly based intrusion detection-a review, Int J Network Secur, 5, 3, (2014)
  • [10] Hu J., Yu X., Qiu D., Et al., A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection, IEEE Network, 23, 1, pp. 42-47, (2009)