Network Security Monitoring by Combining Semi-Supervised Learning and Active Learning

被引:1
作者
Pan, Yun [1 ]
机构
[1] Xinyang Agr & Forestry Univ, Xinyang, Henan, Peoples R China
关键词
Active Learning; Feature Representation; Intrusion Detection; Network Security; Semi-Supervised Learning; Weighted Support Vector Data Description;
D O I
10.4018/IJISMD.313578
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In network intrusion and network security monitoring, there is massive data. When using supervised learning method directly, it will cost lots of time to collect labeled samples, which is expensive. In order to solve this issue, this paper adopts an active learning model to detect network intrusion. First, massive unlabeled samples are used to establish a weighted support vector data description model. Then, the most valuable samples are used to improve the performance of network intrusion by combining with active learning, which utilizes labeled samples and unlabeled samples to extend the weighted support data description model in a semi-supervised learning method. The experimental results show that the active learning can utilize minor labeled sample to reduce the cost of manual labeling work, which is more suitable for an actual network intrusion detection environment.
引用
收藏
页数:9
相关论文
共 17 条
[1]   Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection [J].
Ayo, Femi Emmanuel ;
Folorunso, Sakinat Oluwabukonla ;
Abayomi-Alli, Adebayo A. ;
Adekunle, Adebola Olayinka ;
Awotunde, Joseph Bamidele .
INFORMATION SECURITY JOURNAL, 2020, 29 (06) :267-283
[2]   Density weighted support vector data description [J].
Cha, Myungraee ;
Kim, Jun Seok ;
Baek, Jun-Geol .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (07) :3343-3350
[3]  
Fengli Zhang, 2008, 2008 International Conference on Communications, Circuits and Systems, P519, DOI 10.1109/ICCCAS.2008.4657827
[4]   Active learning increases student performance in science, engineering, and mathematics [J].
Freeman, Scott ;
Eddy, Sarah L. ;
McDonough, Miles ;
Smith, Michelle K. ;
Okoroafor, Nnadozie ;
Jordt, Hannah ;
Wenderoth, Mary Pat .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2014, 111 (23) :8410-8415
[5]   Weighted support vector data description based on chaotic bat algorithm [J].
Hamidzadeh, Javad ;
Sadeghi, Reza ;
Namaei, Neda .
APPLIED SOFT COMPUTING, 2017, 60 :540-551
[6]  
Hong JH, 2014, 2014 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT)
[7]   Network Anomaly Detection Based on Wavelet Analysis [J].
Lu, Wei ;
Ghorbani, Ali A. .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
[8]  
Radivilova Tamara, 2019, 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), P218, DOI 10.1109/ATIT49449.2019.9030452
[9]  
Salman M., 2018, AIVR 2018
[10]  
Siyuan Zhang, 2020, 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), P35, DOI 10.1109/CyberC49757.2020.00016