Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning

被引:20
作者
Seo, Wooseok [1 ]
Pak, Wooguil [2 ]
机构
[1] Wookyoung Informat Technol, Daegu 41519, South Korea
[2] Yengnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
基金
新加坡国家研究基金会;
关键词
Machine learning algorithms; Real-time systems; Classification algorithms; Training; Machine learning; Feature extraction; Databases; Intrusion prevention system; intrusion detection system; machine learning; real-time; two-level classifier;
D O I
10.1109/ACCESS.2021.3066620
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advancements in network technology and associated services have led to a rapid increase in the amount of data traffic. However, the detrimental effects caused by cyber-attacks have also significantly increased. Network attacks are evolving in various forms. Two primary approaches exist for addressing such threats: signature-based detection and anomaly detection. Although the aforementioned approaches can be effective, they also have certain drawbacks. Signature-based detection is vulnerable to variant attacks, while anomaly detection cannot be used for real-time data traffic. For resolving such issues, this paper proposes a two-level classifier that can simultaneously achieve high performance and real-time classification. It employs level 1 and 2 classifiers internally. The level 1 classifier initially performs real-time detection with moderate accuracy for incoming data traffic. If the data cannot be classified with high probability by the classifier, the classification is delayed until the traffic flow terminates. The level 2 classifier then collects the statistical features of the traffic flow for performing precise classification. Compared to existing techniques, the proposed two-level classification method can achieve superior performance in terms of accuracy and detection time.
引用
收藏
页码:46386 / 46397
页数:12
相关论文
共 32 条
[1]  
Abd Jalil K, 2010, INT CONF NETWORK INF, P221, DOI 10.1109/ICNIT.2010.5508526
[2]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[3]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[4]  
[Anonymous], 2018, The UNSW-NB15 dataset description
[5]  
[Anonymous], 2021, IEEE Trans. Broadcast.
[6]  
Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI DOI 10.1145/2382196.2382284
[7]   A Comparative Study of Classification Techniques for Intrusion Detection [J].
Chauhan, Himadri ;
Kumar, Vipin ;
Pundir, Sumit ;
Pilli, Emmanuel S. .
2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, :40-43
[8]  
CHEONG YUN GYUNG, 2017, [Journal of The Korea Institute of Information Security and Cryptology, 정보보호학회논문지], V27, P1385, DOI 10.13089/JKIISC.2017.27.6.1385
[9]  
Ektefa Mohammadreza, 2010, Proceedings of the 2010 International Conference on Information Retrieval and Knowledge Management (CAMP 2010), P200, DOI 10.1109/INFRKM.2010.5466919
[10]  
Ertam F., 2017, International Artificial Intelligence and Data Processing Symposium (IDAP), P1