An optimized feature extraction algorithm for abnormal network traffic detection

被引:16
作者
Chen, Jinfu [1 ,2 ]
Chen, Yuhao [1 ,2 ]
Cai, Saihua [1 ,2 ]
Yin, Shang [1 ,2 ]
Zhao, Lingling [1 ,2 ]
Zhang, Zikang [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang 212013, Jiangsu, Peoples R China
[2] Jiangsu Univ, Jiangsu Key Lab Secur Technol Ind Cyberspace, Zhenjiang 212013, Jiangsu, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2023年 / 149卷
基金
中国博士后科学基金;
关键词
Abnormal network traffic detection; Feature extraction; Kernel principal component analysis; Linear discriminant analysis; PCA;
D O I
10.1016/j.future.2023.07.039
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Abnormal network traffic detection is an important technology to guarantee cyberspace security, it detects malicious attack through identifying the behavior of network traffic. In the process of abnormal network traffic detection, feature extraction plays a very important role, and the quality of extracted features directly determine the effect of detection results. However, the existing feature extraction methods only process the features for one time, which causes these methods cannot provide efficient features; In addition, the heterogeneity of network traffic makes traditional abnormal network traffic detection methods unsuitable for the diverse and complex network traffic. To solve this problem, this paper proposes an optimized feature extraction algorithm called LD-KPCA based on Linear Discriminant Analysis (LDA) and Kernel Principal Component Analysis (KPCA). In the LD-KPCA, the KPCA is used firstly to project the original linearly inseparable data into a high-dimensional linearly separable space, thereby deleting the redundant and irrelevant features; And then, the LDA is used in the new feature space to perform secondary feature extraction. Compared to simply using KPCA, the additional use of LDA can solve the problem that KPCA only focuses on the performance of variance in the features but ignores the performance of mean in the features. Finally, we conduct a large amount of experiments to test the performance of the proposed LD-KPCA algorithm, and the experimental results show that the LD-KPCA algorithm can obtain high precision, recall as well as F1-measure in abnormal network traffic detection.& COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页码:330 / 342
页数:13
相关论文
共 30 条
[21]   A protocol-independent technique for eliminating redundant network traffic [J].
Spring, NT ;
Wetherall, D .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (04) :87-95
[22]  
Sunt YZ, 2011, PROC VLDB ENDOW, V4, P992
[23]  
Wang C., 2016, Proceedings of the 2016 SIAM International Conference on Data Mining, P621
[24]   LDA-based deep transfer learning for fault diagnosis in industrial chemical processes [J].
Wang, Yalin ;
Wu, Dongzhe ;
Yuan, Xiaofeng .
COMPUTERS & CHEMICAL ENGINEERING, 2020, 140
[25]   Unsupervised Change Detection in Multitemporal VHR Images Based on Deep Kernel PCA Convolutional Mapping Network [J].
Wu, Chen ;
Chen, Hongruixuan ;
Du, Bo ;
Zhang, Liangpei .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (11) :12084-12098
[26]   Sentiment word co-occurrence and knowledge pair feature extraction based LDA short text clustering algorithm [J].
Wu, Di ;
Yang, Ruixin ;
Shen, Chao .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2021, 56 (01) :1-23
[27]   An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks [J].
Xiao, Yihan ;
Xing, Cheng ;
Zhang, Taining ;
Zhao, Zhongkai .
IEEE ACCESS, 2019, 7 :42210-42219
[28]   Software defect prediction based on kernel PCA and weighted extreme learning machine [J].
Xu, Zhou ;
Liu, Jin ;
Luo, Xiapu ;
Yang, Zijiang ;
Zhang, Yifeng ;
Yuan, Peipei ;
Tang, Yutian ;
Zhang, Tao .
INFORMATION AND SOFTWARE TECHNOLOGY, 2019, 106 :182-200
[29]  
Yuening Zhang, 2020, Procedia Computer Science, V174, P50, DOI 10.1016/j.procs.2020.06.055
[30]   An Anomaly Detection Model based on One-class SVM to Detect Network Intrusions [J].
Zhang, Ming ;
Xu, Boyi ;
Gong, Jie .
2015 11TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN), 2015, :102-107