ODFM: Abnormal Traffic Detection Based on Optimization of Data Feature and Mining

被引:0
作者
Wu, Xianzong [1 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin, Peoples R China
关键词
Abnormal traffic; detection; data mining; feature dimension optimization; network security; ANOMALY DETECTION;
D O I
10.14569/IJACSA.2023.01411112
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
booming of computer networks and software applications has led to an explosive growth in the potential damage caused by network attacks. Efficient detection of abnormal traffic in networks is appealing for facilely mastering the traffic tracking and locating for network usage at low resource cost. High quality abnormal traffic detection of Internet becomes particularly relevant during the automated services of multiple application situations. This paper proposes a novel abnormal traffic detection algorithm called ODFM based on the optimization of data feature and mining. Specially, we develop a feature selection strategy to reduce the feature analysis dimension, and set a peer-to-peer (P2P) traffic identification module to filter and mine the related service traffic to reduce the amount of data detection and facilitate the abnormal traffic detection. Experimental results demonstrate that the proposed algorithm greatly improves the detection accuracy, which verifies its effectiveness and competitiveness in the general tasks of abnormal network traffic detection.
引用
收藏
页码:1104 / 1109
页数:6
相关论文
共 37 条
  • [1] Research on Auto-adaptive Traffic-aware Abnormal Detection Method
    Cao, Min
    Cheng, Dong-nian
    Wu, Xi
    Wang, Bin
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 445 - +
  • [2] A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
    El Sayed, Mahmoud Said
    Le-Khac, Nhien-An
    Azer, Marianne A.
    Jurcut, Anca D.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) : 1862 - 1880
  • [3] Ge Chen, 2021, 2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI), P183, DOI 10.1109/ICHCI54629.2021.00046
  • [4] Geppener V., 2021, 2021 INT C INF TECHN, P1
  • [5] Gong Haoquan, 2023, 2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS), P32, DOI 10.1109/ISCTIS58954.2023.10213019
  • [6] Mathematical Validation of Proposed Machine Learning Classifier for Heterogeneous Traffic and Anomaly Detection
    Guezzaz, Azidine
    Asimi, Younes
    Azrour, Mourade
    Asimi, Ahmed
    [J]. BIG DATA MINING AND ANALYTICS, 2021, 4 (01): : 18 - 24
  • [7] Guolou Ping, 2022, 2022 IEEE 8th International Conference on Computer and Communications (ICCC), P2303, DOI 10.1109/ICCC56324.2022.10065635
  • [8] Huan WM, 2020, PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), P980, DOI [10.1109/ITOEC49072.2020.9141897, 10.1109/itoec49072.2020.9141897]
  • [9] Jadidi Z, 2015, 2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS)
  • [10] Karim SMA, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P678, DOI [10.1109/CCWC47524.2020.9031262, 10.1109/ccwc47524.2020.9031262]