ICDF: Intrusion collaborative detection framework based on confidence

被引:4
作者
Wang, Zhi [1 ]
Shao, Leshi [1 ]
Cheng, Kai [1 ]
Liu, Yuanzhao [1 ]
Jiang, Jianan [2 ]
Nie, Yuanping [3 ]
Li, Xiang [3 ]
Kuang, Xiaohui [3 ]
机构
[1] Nankai Univ, Coll Cyber Sci, Tianjin, Peoples R China
[2] Guangzhou Univ, Inst Artificial & Intelligence, Guangzhou 510006, Peoples R China
[3] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
confidence; intrusion detection; IVAP; model collaboration; ALGORITHMS;
D O I
10.1002/int.22877
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many machine-learning-based intrusion detection methods have been proposed, however there is a lack of collaboration among these methods. Faced with a cascade of malicious behaviors and various running environments, coupled with the endless emergence of new malicious activities, it is difficult for us to choose an algorithm manually that is suitable for all scenarios. In addition, usually the binary detection models are applied that only "normal" or "abnormal" decision is made, and it is difficult for us to know how much confidence we have in the prediction model. In this study, we propose an intrusion collaborative detection framework (ICDF), an ICDF that allows heterogeneous detection models to effectively work together which have complementary expertise. A multialgorithm model ensemble learning method with confidence interval is adopted. In this process, each algorithm model only makes prediction judgments on its own credible probability interval and refuses to predict outside the interval. The final result is generated by voting based on the confidence of multiple models. Ten detection algorithms were tested on three different data sets. Compared with different single algorithms, ICDF could achieve high precision and recall rate, and the best F1 scores.
引用
收藏
页码:7180 / 7199
页数:20
相关论文
共 50 条
  • [31] Design and Management of Collaborative Intrusion Detection Networks
    Fung, Carol J.
    Boutaba, Raouf
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 955 - 961
  • [32] A survey of coordinated attacks and collaborative intrusion detection
    Zhou, Chenfeng Vincent
    Leckie, Christopher
    Karunasekera, Shanika
    COMPUTERS & SECURITY, 2010, 29 (01) : 124 - 140
  • [33] GonoGo - Assessing the Confidence Level of Distribute Intrusion Detection Systems Alarms Based on BGP
    Silva, Renato S.
    de Moraes, Luis M. Felipe
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 209 - 219
  • [34] Application of a collaborative filtering recommendation algorithm based on cloud model in intrusion detection
    Wang D.
    Zhou Z.
    Journal of Networks, 2011, 6 (02) : 214 - 221
  • [35] TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
    Yu, JQ
    Reddy, YVR
    Selliah, S
    Reddy, S
    Bharadwaj, V
    Kankanahalli, S
    ADVANCED ENGINEERING INFORMATICS, 2005, 19 (02) : 93 - 101
  • [36] A Framework for Intrusion Detection in Heterogeneous Environments
    Zhou, Bo
    Shi, Qi
    Merabti, Madjid
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 1244 - 1248
  • [37] An integrated visualisation framework for intrusion detection
    Read, Huw
    Blyth, Andrew
    2006 IEEE Information Assurance Workshop, 2006, : 268 - 274
  • [38] An Evaluation Framework for Intrusion Detection Dataset
    Gharib, Amirhossein
    Sharafaldin, Iman
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2014, : 41 - 45
  • [39] Development of a legal framework for intrusion detection
    Johnston, SR
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 138 - 157
  • [40] A distributed autonomous intrusion detection framework
    Cai, Yu
    2007 IEEE GLOBECOM WORKSHOPS, PROCEEDINGS, 2007, : 126 - 130