A Two-Stage Anomaly Detection Method Based on User Preference Features and the Deep Fusion Model

被引:0
作者
Zhang, Sen-Lei [1 ,2 ]
Zhang, Bin [1 ,2 ]
Zhou, Yi-Tao [1 ,2 ]
Guo, Yue-Xuan [1 ,2 ]
Tan, Jing-Lei [1 ,2 ]
机构
[1] SSF Informat Engn Univ, Zhengzhou 450001, Peoples R China
[2] Key Lab Informat Secur, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 10期
关键词
two-stage detection; user preference features; deep fusion model; cyberspace situation awareness; ATTACKS;
D O I
10.3390/app13106217
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Rapid and accurate anomaly traffic detection is one of the most important research problems in cyberspace situational awareness. In order to improve the accuracy and efficiency of the detection, a two-stage anomaly detection method based on user preference features and a deep fusion model is proposed. First, a user-preference list of attack detection tasks is constructed based on the resilient distributed dataset. Following that, the detection tasks are divided into multiple stages according to the detection framework, which allows multiple worker hosts to work in parallel. Finally, a deep fusion classifier is trained using the features extracted from the input traffic data. Experimental results indicate that the proposed method achieves better detection accuracy compared to the existing typical methods. Furthermore, compared with stand-alone detection, the proposed method can effectively improve the time efficiencies of the model's training and testing to a large extent. The ablation experiment justifies the use of the machine learning method.
引用
收藏
页数:14
相关论文
共 19 条
[1]   A new DDoS attacks intrusion detection model based on deep learning for cybersecurity [J].
Akgun, Devrim ;
Hizal, Selman ;
Cavusoglu, Unal .
COMPUTERS & SECURITY, 2022, 118
[2]  
[Anonymous], 2017, P 2017 4 INT C SIGNA, DOI DOI 10.1109/ICSCN.2017.8085703
[3]   Spark SQL: Relational Data Processing in Spark [J].
Armbrust, Michael ;
Xin, Reynold S. ;
Lian, Cheng ;
Huai, Yin ;
Liu, Davies ;
Bradley, Joseph K. ;
Meng, Xiangrui ;
Kaftan, Tomer ;
Franklint, Michael J. ;
Ghodsi, Ali ;
Zaharia, Matei .
SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, :1383-1394
[4]   Deep Learning Poison Data Attack Detection [J].
Chacon, Henry ;
Silva, Samuel Henrique ;
Rad, Paul .
2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, :971-978
[5]   Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark [J].
Chen, Liguo ;
Zhang, Yuedong ;
Zhao, Qi ;
Geng, Guanggang ;
Yan, ZhiWei .
15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 :310-315
[6]   MapReduce: Review and open challenges [J].
Hashem, Ibrahim Abaker Targio ;
Anuar, Nor Badrul ;
Gani, Abdullah ;
Yaqoob, Ibrar ;
Xia, Feng ;
Khan, Samee Ullah .
SCIENTOMETRICS, 2016, 109 (01) :389-422
[7]   Real-time DDoS attack detection using FPGA [J].
Hoque, N. ;
Kashyap, H. ;
Bhattacharyya, D. K. .
COMPUTER COMMUNICATIONS, 2017, 110 :48-58
[8]   BRAIN: BehavioR based Adaptive Intrusion detection in Networks: Using Hardware Performance Counters to detect DDoS Attacks [J].
Jyothi, Vinayaka ;
Wang, Xueyang ;
Addepalli, Sateesh K. ;
Karri, Ramesh .
2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, :587-588
[9]   Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing [J].
Khan, Suleman ;
Gani, Abdullah ;
Wahab, Ainuddin Wahid Abdul ;
Singh, Prem Kumar .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :499-508
[10]   Survey of intrusion detection systems: techniques, datasets and challenges [J].
Khraisat, Ansam ;
Gondal, Iqbal ;
Vamplew, Peter ;
Kamruzzaman, Joarder .
CYBERSECURITY, 2019, 2 (01)