Intelligent Processing of Intrusion Detection Data

被引:8
|
作者
Duan, Tao [1 ,3 ,4 ,5 ,6 ]
Tian, Youhui [2 ]
Zhang, Hanrui [1 ,3 ,5 ,6 ]
Liu, Yaozong [3 ]
Li, Qianmu [1 ]
Jiang, Jian [4 ]
Shi, Zongsheng [4 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[2] Jiangsu Vocat Inst Commerce, Nanjing 211168, Peoples R China
[3] Wuyi Univ, Intelligent Mfg, Jiangmen 529020, Peoples R China
[4] Jiangsu Zhongtian Internet Technol Co Ltd, Nantong 226463, Peoples R China
[5] Nanjing Univ Sci & Technol, Jiangsu Grad Workstn, Nanjing 210094, Peoples R China
[6] Nanjing Liancheng Technol Dev Co Ltd, Nanjing 210008, Peoples R China
关键词
Intrusion detection; Feature extraction; Principal component analysis; Biological neural networks; Data processing; Data models; Analytical models; data mining; deep belief network;
D O I
10.1109/ACCESS.2020.2989498
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection technology, as an active and effective dynamic network defense technology, has rapidly become a hot research topic in the field of network security since it was proposed. However, current intrusion detection still faces some problems and challenges that affect its detection performance. Especially with the rapid development of the current network, the volume and dimension of network data are increasing day by day, and the network is full of a large number of unlabeled data, which brings great pressure on the data processing methods of IDS. In view of the tremendous pressure of intrusion detection brought by the current complex and high-dimensional network environment, this paper provides a feasible solution. Firstly, this paper briefly outlines the necessity of feature learning, the shortcomings of traditional feature learning methods and the new breakthroughs brought by deep belief network in feature learning, and focuses on the principle and working mechanism of deep belief network and Principal Component Analysis (PCA). Then, it constructs the intrusion detection model based on PCA-BP and DBN respectively. And through the experimental evaluation of the two detection models, a comparative experiment between deep belief network and principal component analysis is constructed. The experimental results show that deep belief network has unique advantages and good performance in feature learning. Therefore, deep belief network can be applied in the field of intrusion detection to extract effective features from the current high-dimensional and redundant network data, thereby improving the detection performance of IDS and its adaptability to the current complex and high-dimensional network environment.
引用
收藏
页码:78330 / 78342
页数:13
相关论文
共 50 条
  • [1] Research on Intelligent Detection of Intrusion Data in Network
    Zhu, Guangjie
    Yao, Honglei
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5 - 10
  • [2] Application of intelligent information processing technologies to intrusion detection system
    Wang, Xuren
    He, Famei
    Peng, Yan
    General System and Control System, Vol I, 2007, : 274 - 277
  • [3] Application of PSVM and data processing for intrusion detection
    Xiao, Haijun
    Hong, Fan
    Zhang, Zhaoli
    Liao, Junguo
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 627 - 633
  • [4] An Imbalanced Data Processing Method for Intrusion Detection
    Xu, Yichao
    Zhao, Rui
    Zhang, Wenyue
    2024 5TH INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE, ICTC 2024, 2024, : 82 - 87
  • [5] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
  • [6] Intelligent intrusion detection based on fuzzy Big Data classification
    Jemili, Farah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3719 - 3736
  • [7] Intelligent intrusion detection based on fuzzy Big Data classification
    Farah Jemili
    Cluster Computing, 2023, 26 : 3719 - 3736
  • [8] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [9] Approaches and Data Processing Techniques for Intrusion Detection Systems
    Srinivasu, Pakkurthi
    Avadhani, P. S.
    Korimilli, Vishal
    Ravipati, Prudhvi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 181 - 186
  • [10] Immune algorithms based on data processing in intrusion detection
    Zhang, Yufang
    Xiong, Zhongyang
    Chen, Yan
    Li, Guangyong
    Geng, Xiaofei
    Journal of Computational Information Systems, 2008, 4 (01): : 293 - 300