Research on methods of network connection based anomaly intrusion detection

被引:0
|
作者
Wang, Y [1 ]
Zhang, HM [1 ]
Yang, HH [1 ]
Wang, XY [1 ]
机构
[1] Guilin Univ Elect Technol, Network Informat Ctr, Guilin 541004, Peoples R China
关键词
intrusion detection; support vector machine; feature selection; rough sets;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The KDD 99 Cup dataset, widely used in many anomaly intrusion detection researches, is a kind of off-line simulation system and not suit to on-line intrusion detection. In this paper, an on-line network based intrusion detection simulation environment was established and several methods for anomaly intrusion detection were presented. We first chose SVM as the detector to classify the incoming connection and performed 5-folds cross-validation to tune the parameter of SVM. Then we adopted rough sets to classify the same dataset for comparison and RFE-SVM to select import features for intrusion detector. The experimental results indicate that the extracted features are reasonably selected and the SVM detect engine works and yields better performance in anomaly detection.
引用
收藏
页码:1304 / 1309
页数:6
相关论文
共 50 条
  • [1] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [2] Research on Network Traffic Data Anomaly Identification and Detection Based on an Intrusion Detection Algorithm
    Zhang, Hui
    International Journal of Network Security, 2022, 24 (04) : 689 - 694
  • [3] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [4] A systematic literature review of methods and datasets for anomaly-based network intrusion detection
    Yang, Zhen
    Liu, Xiaodong
    Li, Tong
    Wu, Di
    Wang, Jinjiang
    Zhao, Yunwei
    Han, Han
    COMPUTERS & SECURITY, 2022, 116
  • [5] Review on Anomaly based Network Intrusion Detection System
    Samrin, Rafath
    Vasumathi, D.
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 141 - 147
  • [6] Anomaly intrusion detection system based on neural network
    Li, Yuan-Bing
    Fang, Ding-Yi
    Wu, Xiao-Nan
    Chen, Xiao-Jiang
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2005, 27 (09): : 1648 - 1651
  • [7] Genetic algorithms in intrusion detection based on network anomaly
    Zhang, Feng-Bin
    Yang, Yong-Tian
    Jiang, Zi-Yang
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2004, 32 (05): : 875 - 877
  • [8] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [9] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [10] An Unsupervised Network Intrusion Detection Based on Anomaly Analysis
    Zhong, Jiang
    Deng, Xiongbing
    Wen, Luosheng
    Feng, Yong
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 367 - +