ICDF: Intrusion collaborative detection framework based on confidence

被引:4
|
作者
Wang, Zhi [1 ]
Shao, Leshi [1 ]
Cheng, Kai [1 ]
Liu, Yuanzhao [1 ]
Jiang, Jianan [2 ]
Nie, Yuanping [3 ]
Li, Xiang [3 ]
Kuang, Xiaohui [3 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin, Peoples R China
[2] Guangzhou Univ, Inst Artificial & Intelligence, Guangzhou 510006, Peoples R China
[3] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
confidence; intrusion detection; IVAP; model collaboration; ALGORITHMS;
D O I
10.1002/int.22877
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many machine-learning-based intrusion detection methods have been proposed, however there is a lack of collaboration among these methods. Faced with a cascade of malicious behaviors and various running environments, coupled with the endless emergence of new malicious activities, it is difficult for us to choose an algorithm manually that is suitable for all scenarios. In addition, usually the binary detection models are applied that only "normal" or "abnormal" decision is made, and it is difficult for us to know how much confidence we have in the prediction model. In this study, we propose an intrusion collaborative detection framework (ICDF), an ICDF that allows heterogeneous detection models to effectively work together which have complementary expertise. A multialgorithm model ensemble learning method with confidence interval is adopted. In this process, each algorithm model only makes prediction judgments on its own credible probability interval and refuses to predict outside the interval. The final result is generated by voting based on the confidence of multiple models. Ten detection algorithms were tested on three different data sets. Compared with different single algorithms, ICDF could achieve high precision and recall rate, and the best F1 scores.
引用
收藏
页码:7180 / 7199
页数:20
相关论文
共 50 条
  • [1] Toward a blockchain-based framework for challenge-based collaborative intrusion detection
    Li, Wenjuan
    Wang, Yu
    Li, Jin
    Au, Man Ho
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (02) : 127 - 139
  • [2] Toward a blockchain-based framework for challenge-based collaborative intrusion detection
    Wenjuan Li
    Yu Wang
    Jin Li
    Man Ho Au
    International Journal of Information Security, 2021, 20 : 127 - 139
  • [3] Collaborative intrusion detection based on coordination agent
    Zhang, R
    Qian, DP
    Chen, H
    Wu, WG
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 175 - 179
  • [4] Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory
    Anwar, Anika
    Halabi, Talal
    Zulkernine, Mohammad
    INTERNET OF THINGS, 2022, 20
  • [5] An Adaptive and Collaborative Method Based on GMRA for Intrusion Detection
    Teng, Shaohua
    Zhang, Yongzhi
    Zhang, Wei
    Liang, Lu
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2021, PT I, 2022, 1491 : 72 - 84
  • [6] Towards Blockchained Challenge-Based Collaborative Intrusion Detection
    Li, Wenjuan
    Wang, Yu
    Li, Jin
    Au, Man Ho
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, 2019, 11605 : 122 - 139
  • [7] Studying on collaborative intrusion detection method: based on planning recognition
    Hu, Haibo
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT ICPEM 2009, VOL 3: STATISTICS EDUCATION IN ECONOMIC TRAINING, 2009, : 69 - 73
  • [8] SVM-DT-Based Adaptive and Collaborative Intrusion Detection
    Shaohua Teng
    Naiqi Wu
    Haibin Zhu
    Luyao Teng
    Wei Zhang
    IEEE/CAAJournalofAutomaticaSinica, 2018, 5 (01) : 108 - 118
  • [9] SVM-DT-Based Adaptive and Collaborative Intrusion Detection
    Teng, Shaohua
    Wu, Naiqi
    Zhu, Haibin
    Teng, Luyao
    Zhang, Wei
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2018, 5 (01) : 108 - 118
  • [10] A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees
    Teng, Luyao
    Teng, Shaohua
    Tang, Feiyi
    Zhu, Haibin
    Zhang, Wei
    Liu, Dongning
    Liang, Lu
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2014, : 898 - 905