Network Intrusion Detection Based on Active Semi-supervised Learning

被引:15
作者
Zhang, Yong [1 ]
Niu, Jie [1 ]
He, Guojian [2 ]
Zhu, Lin [3 ]
Guo, Da [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing, Peoples R China
[2] Hebei Univ Econ & Business, Phys Educ Dept, Shijiazhuang, Hebei, Peoples R China
[3] China Mobile Res Inst, Beijing, Peoples R China
来源
51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN-W 2021) | 2021年
关键词
network intrusion detection; scarcity of labeled data; active learning; semi-supervised;
D O I
10.1109/DSN-W52860.2021.00031
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing scale and automation of network attacks, traditional detection methods have been unable to meet the demand for intrusion detection in the current network environment, and we always face with the scarcity of label data in the network environment. In view of this situation, this paper proposes a network intrusion detection algorithm based on active semi-supervised learning, by setting a minimum class-distance threshold for active learning and a highest classification threshold for semi-supervised learning, then selecting unlabeled samples with rich information content, which labeled and added to the training set to retrain the model, and iterating repeatedly until meet the established conditions. The proposed algorithm combines the weak sensitivity of semi-supervised learning to labels and the selectivity of active learning for implicit information. The experimental results on the CTU and CICIDS2017 datasets show that the various indicators of the combined algorithm have been significantly improved.
引用
收藏
页码:129 / 135
页数:7
相关论文
共 27 条
[1]   Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system [J].
Al-Yaseen, Wathiq Laftah ;
Othman, Zulaiha Ali ;
Nazri, Mohd Zakree Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 :296-303
[2]  
[Anonymous], 2002, ICML
[3]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[4]  
Bahaa-Eldin A. M., 2011, Proceedings of the 2011 International Conference on Computer Engineering & Systems (ICCES 2011), P64, DOI 10.1109/ICCES.2011.6141013
[5]  
Bekerman D, 2015, IEEE CONF COMM NETW, P134, DOI 10.1109/CNS.2015.7346821
[6]   Performance evaluation of intrusion detection based on machine learning using Apache Spark [J].
Belouch, Mustapha ;
El Hadaj, Salah ;
Idhammad, Mohamed .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :1-6
[7]  
El-Maghraby RT, 2017, 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), P188, DOI 10.1109/ICCES.2017.8275301
[8]  
Felder R. M., 2009, ASQ Higher Education Brief, V2, P1, DOI DOI 10.4324/9780203891414-15
[9]  
Hao Zhang, 2020, 2020 International Conference on Pervasive Artificial Intelligence (ICPAI), P35, DOI 10.1109/ICPAI51961.2020.00014
[10]  
Javaid A, 2016, Eai Endorsed Transactions on Security and Safety, V3, P2