A semi-supervised learning model for intrusion detection

被引:5
作者
Jiang, Eric P. [1 ]
机构
[1] Univ San Diego, 5998 Alcala Pk, San Diego, CA 92110 USA
来源
INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS | 2019年 / 13卷 / 03期
关键词
Network security; intrusion detection systems; feature selection; semi-supervised learning;
D O I
10.3233/IDT-180127
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet, e-commerce and telecommunication networks have become a driving force for modern economic growth and development throughout the world. They have also made the underlying network infrastructure the backbone of contemporary life, which enables us to connect to global flows of information, people and goods. Unfortunately, hostile attacks on various network infrastructures by malicious predators have grown significantly over recent years. In this paper, we propose a semi-supervised learning approach, STBoost, which is based on a self-training process and the standard boosting algorithm, for network intrusion detection. The approach has its unique features and can be used with a small set of labeled training data to build up initial models of normal and anomalous network activity behaviors, and then it employs additional unlabeled audit data to further refine the behavior models. We have conducted a number of experiments with the approach on the KDD Cup 99 data set and also compared it with another fuzziness based semi-supervised algorithm and several widely used supervised learning approaches. The experimental results have shown that the proposed semi-supervised approach represents a viable and competitive technique for detecting potential network intrusions.
引用
收藏
页码:343 / 353
页数:11
相关论文
共 26 条
[1]  
Abraham A., 2007, Int. J. Netw. Secur, V4, P328
[2]   D-SCIDS: Distributed soft computing intrusion detection system [J].
Abraham, Ajith ;
Jain, Ravi ;
Thomas, Johnson ;
Han, Sang Yong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :81-98
[3]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[4]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[5]  
Cannady J., 1998, National Information Systems Security Conference, P443
[6]  
Chen C, 2008, P 2008 INT C SYST MA
[7]   Application of SVM and ANN for intrusion detection [J].
Chen, WH ;
Hsu, SH ;
Shen, HP .
COMPUTERS & OPERATIONS RESEARCH, 2005, 32 (10) :2617-2634
[8]  
Christianini B., 2000, INTRO SUPPORT VECTOR
[9]  
Eskin E, 2002, APPL DATA MINING COM, P4
[10]  
Freund Y, 1996, P 13 INT C MACH LEAR, V96, P148, DOI DOI 10.5555/3091696.3091715